Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: Functionally, a Date

      September 16, 2025

      Creating Elastic And Bounce Effects With Expressive Animator

      September 16, 2025

      Microsoft shares Insiders preview of Visual Studio 2026

      September 16, 2025

      From Data To Decisions: UX Strategies For Real-Time Dashboards

      September 13, 2025

      DistroWatch Weekly, Issue 1139

      September 14, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Can I use React Server Components (RSCs) today?

      September 16, 2025
      Recent

      Can I use React Server Components (RSCs) today?

      September 16, 2025

      Perficient Named among Notable Providers in Forrester’s Q3 2025 Commerce Services Landscape

      September 16, 2025

      Sarah McDowell Helps Clients Build a Strong AI Foundation Through Salesforce

      September 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I Ran Local LLMs on My Android Phone

      September 16, 2025
      Recent

      I Ran Local LLMs on My Android Phone

      September 16, 2025

      DistroWatch Weekly, Issue 1139

      September 14, 2025

      sudo vs sudo-rs: What You Need to Know About the Rust Takeover of Classic Sudo Command

      September 14, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Security»85.000 RoundCube-mailservers bevatten actief misbruikt RCE-lek

    85.000 RoundCube-mailservers bevatten actief misbruikt RCE-lek

    June 10, 2025

    85.000 RoundCube-mailservers bevatten actief misbruikt RCE-lek

    Wereldwijd zijn er ruim 85.000 RoundCube-mailservers die een actief misbruikte kwetsbaarheid bevatten die remote code execution (RCE) mogelijk maakt, waarvan meer dan zeventienhonderd in Nederland. Da …
    Read more


    Published Date:
    Jun 10, 2025 (2 hours, 26 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-49113

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleSAP June 2025 Patch Day – 14 Vulnerabilities Patched Across Multiple Products
    Next Article SAP Patch Fixes Critical CVSS 9.6 Flaw in NetWeaver: Privilege Escalation and System Integrity at Risk

    Related Posts

    Development

    Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

    September 14, 2025
    Development

    Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass

    September 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads

    Development

    CVE-2025-53108 – HomeBox Unauthenticated Attachment Manipulation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-53938 – WeGIA Authentication Bypass

    Common Vulnerabilities and Exposures (CVEs)

    These midrange Bose headphones are on sale for $130 off – act fast before the deal ends

    News & Updates

    Highlights

    CVE-2023-53142 – “Ice: Buffer Overflow in ice_get_module_eeprom()”

    May 2, 2025

    CVE ID : CVE-2023-53142

    Published : May 2, 2025, 4:15 p.m. | 34 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    ice: copy last block omitted in ice_get_module_eeprom()

    ice_get_module_eeprom() is broken since commit e9c9692c8a81 (“ice:
    Reimplement module reads used by ethtool”) In this refactor,
    ice_get_module_eeprom() reads the eeprom in blocks of size 8.
    But the condition that should protect the buffer overflow
    ignores the last block. The last block always contains zeros.

    Bug uncovered by ethtool upstream commit 9538f384b535
    (“netlink: eeprom: Defer page requests to individual parsers”)
    After this commit, ethtool reads a block with length = 1;
    to read the SFF-8024 identifier value.

    unpatched driver:
    $ ethtool -m enp65s0f0np0 offset 0x90 length 8
    Offset Values
    —— ——
    0x0090: 00 00 00 00 00 00 00 00
    $ ethtool -m enp65s0f0np0 offset 0x90 length 12
    Offset Values
    —— ——
    0x0090: 00 00 01 a0 4d 65 6c 6c 00 00 00 00
    $

    $ ethtool -m enp65s0f0np0
    Offset Values
    —— ——
    0x0000: 11 06 06 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    0x0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 01 08 00
    0x0070: 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00

    patched driver:
    $ ethtool -m enp65s0f0np0 offset 0x90 length 8
    Offset Values
    —— ——
    0x0090: 00 00 01 a0 4d 65 6c 6c
    $ ethtool -m enp65s0f0np0 offset 0x90 length 12
    Offset Values
    —— ——
    0x0090: 00 00 01 a0 4d 65 6c 6c 61 6e 6f 78
    $ ethtool -m enp65s0f0np0
    Identifier : 0x11 (QSFP28)
    Extended identifier : 0x00
    Extended identifier description : 1.5W max. Power consumption
    Extended identifier description : No CDR in TX, No CDR in RX
    Extended identifier description : High Power Class (> 3.5 W) not enabled
    Connector : 0x23 (No separable connector)
    Transceiver codes : 0x88 0x00 0x00 0x00 0x00 0x00 0x00 0x00
    Transceiver type : 40G Ethernet: 40G Base-CR4
    Transceiver type : 25G Ethernet: 25G Base-CR CA-N
    Encoding : 0x05 (64B/66B)
    BR, Nominal : 25500Mbps
    Rate identifier : 0x00
    Length (SMF,km) : 0km
    Length (OM3 50um) : 0m
    Length (OM2 50um) : 0m
    Length (OM1 62.5um) : 0m
    Length (Copper or Active cable) : 1m
    Transmitter technology : 0xa0 (Copper cable unequalized)
    Attenuation at 2.5GHz : 4db
    Attenuation at 5.0GHz : 5db
    Attenuation at 7.0GHz : 7db
    Attenuation at 12.9GHz : 10db
    ……..
    ….

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    SuppaFTP is an FTP/FTPS client library for Rust

    April 16, 2025

    You can try Linux without abandoning Windows through dual-booting – here’s how

    July 15, 2025

    KDE Plasma 6.4 su Arch Linux: Necessaria l’Installazione Manuale di Pacchetti

    June 21, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.