Trellix exposes SquidLoader malware targeting Hong Kong, Singapore, and Australia's financial service institutions. Learn about its advanced evasion tactics and stealthy attacks.
Critical zero-day vulnerabilities in Microsoft SharePoint, tracked as CVE-2025-53770 and CVE-2025-53771, have been actively exploited since at least July 18th, with no patch available and at least 85 servers already compromised worldwide. [...]
Currently trending CVE - Hype Score: 1 - A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.
Hewlett-Packard Enterprise (HPE) is warning of hardcoded credentials in Aruba Instant On Access Points that allow attackers to bypass normal device authentication and access the web interface. [...]
A vulnerability has been found in Linux Kernel up to 6.14.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component rtsx_usb_ms. The manipulation leads to use after free.
This vulnerability is known as CVE-2025-22020. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.15/6.13.3/6.14-rc2. It has been classified as problematic. Affected is an unknown function of the file kernel/locking/mutex.c. The manipulation leads to uninitialized pointer.
This vulnerability is traded as CVE-2025-21824. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. This affects the function cdns_uart_isr of the component xilinx_uartps. The manipulation leads to deadlock.
This vulnerability is uniquely identified as CVE-2025-21820. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was suspected in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2/6.14-rc1. Further investigation has shown that this issues is a false-positive. Please review the sources mentioned and consider not using this entry at all.
A vulnerability was found in Pro-face Pro-Server EX up to 1.23.000. It has been classified as problematic. This affects an unknown part of the file ProServr.exe of the component C Runtime. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2012-3795. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. Affected by this vulnerability is an unknown functionality of the file ptp_s390.c of the component ptp. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2025-21814. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. It has been rated as critical. Affected by this issue is the function ax25_setsockopt of the component ax25. The manipulation leads to deadlock.
This vulnerability is handled as CVE-2025-21812. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.