A cyberespionage campaign carried out by a China-linked threat actor affected at least 53 government and telecom organizations across 42 countries, Google said.
French professional football club Olympique de Marseille has confirmed a cyberattack after a threat actor claimed on Monday that it breached the club's systems earlier this month. [...]
A vulnerability was found in Juniper Junos OS on SRX. It has been declared as critical. Affected by this vulnerability is an unknown functionality. Such manipulation leads to missing authentication.
This vulnerability is documented as CVE-2023-36846. The attack can be executed remotely. Additionally, an exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Juniper Junos OS on EX. It has been rated as critical. Affected by this issue is some unknown functionality. Performing a manipulation results in missing authentication.
This vulnerability is reported as CVE-2023-36847. The attack is possible to be carried out remotely. Moreover, an exploit is present.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.16.9. This affects an unknown function of the component spi. The manipulation leads to improper update of reference count.
This vulnerability is documented as CVE-2025-40005. The attack requires being on the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.59/6.17.9. This affects the function is_signaled. This manipulation causes deadlock.
This vulnerability is handled as CVE-2025-68223. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.58/6.17.8. It has been declared as critical. The affected element is the function scan_get_next_rmap_item of the component ksm. The manipulation results in deadlock.
This vulnerability is cataloged as CVE-2025-68211. The attack must originate from the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.158/6.6.117/6.12.59/6.17.9. Affected by this vulnerability is the function timer_shutdown_sync of the component timers. Executing a manipulation can lead to race condition.
This vulnerability is registered as CVE-2025-68214. The attack requires access to the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.17.2. This impacts the function __sk_dst_get. The manipulation leads to use after free.
This vulnerability is referenced as CVE-2025-40149. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.17.4/6.18-rc1. Impacted is the function smp_processor_id of the component usbnet. The manipulation results in stack-based buffer overflow.
This vulnerability is reported as CVE-2025-40164. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.117/6.12.59/6.17.9 and classified as critical. This affects the function devl_rate_nodes_destroy of the file /sys/bus/netdevsim/new_device. This manipulation causes improper update of reference count.
The identification of this vulnerability is CVE-2025-40251. The attack needs to be done within the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.12.54/6.17.4/6.18-rc1. Affected by this vulnerability is the function ksmbd_session_rpc_method. Executing a manipulation can lead to race condition.
This vulnerability is registered as CVE-2025-40090. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.52/6.17.2. Affected is the function ksmbd_session_rpc_open. This manipulation causes use after free.
This vulnerability is handled as CVE-2025-40039. The attack can only be done within the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.113/6.12.54/6.17.2. It has been rated as critical. Impacted is the function userfaultfd_release_all of the component ksm. Performing a manipulation results in denial of service.
This vulnerability is known as CVE-2025-40040. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Linux Kernel up to 6.17.2. Impacted is the function hfsplus_uni2asc. The manipulation results in out-of-bounds read.
This vulnerability was named CVE-2025-40082. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.