Overview This article details CVE-2025-65106, a critical template injection vulnerability discovered in LangChain, a popular framework for building agents and LLM-powered applications. The vulnerability allows attackers to potentially access Python object internals through template syntax, posing a significant risk to applications that accept untrusted template strings. Technical Details CVE-2025-65106 affects LangChain versions 0.3.79 and prior, as well as versions 1.0.0 through 1.0.6. The vulnerability resides in LangChain’s prompt template system, specifically within ChatPromptTemplate and related prompt template classes. An attacker can exploit this flaw by injecting malicious code into template strings if the application doesn’t properly sanitize or validate the…
-
-
Overview CVE-2025-65102 describes a vulnerability found in PJSIP, a free and open-source multimedia communication library. Specifically, this issue affects users employing the Opus audio codec in the receiving direction. The vulnerability lies within the Opus PLC (Packet Loss Concealment) implementation and can potentially cause unexpected application termination due to a memory overwrite. The vulnerability has been addressed in PJSIP version 2.16. Technical Details The vulnerability occurs because the Opus PLC may zero-fill the input frame based on the decoder ptime (packet time). However, the actual input frame length, which is derived from the stream ptime, might be shorter than the…
-
Published: 2025-11-21T22:16:32.560 Overview CVE-2025-65092 is a security vulnerability affecting the ESP32-P4 microcontroller when using its hardware JPEG decoder within Espressif’s IoT Development Framework (ESP-IDF). Specifically, versions 5.5.1, 5.4.3, and 5.3.4 lack proper validation checks in the software parser associated with the hardware JPEG decoder. This can be exploited by providing a specially crafted malicious JPEG image, leading to an out-of-bounds array access. Technical Details The vulnerability resides within the JPEG decoding routine used by the ESP32-P4’s hardware accelerator. The software parser, responsible for interpreting the JPEG image data, fails to adequately validate input parameters. An attacker can craft a malicious…
-
Overview CVE-2025-43374 is a security vulnerability affecting several Apple operating systems, including iOS, iPadOS, macOS, visionOS, and watchOS. This vulnerability is classified as an out-of-bounds read within the kernel memory, potentially allowing an attacker in physical proximity to access sensitive data. Apple has released security updates to address this issue by implementing improved bounds checking. Technical Details The core issue lies in insufficient bounds checking during certain memory operations within the kernel. An attacker with physical access to a vulnerable device could potentially craft inputs or trigger specific actions that cause the system to read beyond the allocated memory boundaries.…
-
Overview CVE-2025-31266 describes a spoofing vulnerability affecting Apple’s Safari browser (version 18.5) and macOS Sequoia (version 15.5). This flaw could allow a malicious website to potentially spoof the domain name displayed in the title of a pop-up window, potentially misleading users into believing they are interacting with a legitimate site when they are not. Technical Details The vulnerability arises from how Safari and macOS handle the truncation of fully qualified domain names (FQDNs) when displaying them in pop-up window titles. The fix implemented in Safari 18.5 and macOS Sequoia 15.5 involves improved truncation logic to prevent malicious websites from crafting…
-
Overview CVE-2025-31248 describes a critical security vulnerability affecting macOS. This issue stems from a parsing flaw in the handling of directory paths, which, if exploited, could allow a malicious application to bypass security restrictions and access sensitive user data. Apple has addressed this vulnerability with improved path validation in the following updates: macOS Ventura 13.7.3, macOS Sequoia 15.5, and macOS Sonoma 14.7.3. Users are strongly advised to update their systems to these versions to mitigate the risk. Technical Details The vulnerability lies in the way macOS parses and validates directory paths. A malformed or carefully crafted path could potentially trick…
-
Overview CVE-2025-31216 is a security vulnerability affecting iOS and iPadOS devices. It allows an attacker with physical access to a device to potentially override managed Wi-Fi profiles. This vulnerability has been addressed in the latest security updates released by Apple. Technical Details The vulnerability arises from insufficient checks performed by the operating system when handling Wi-Fi profile configurations. An individual with physical access to a vulnerable device could potentially exploit this flaw to modify or replace existing managed Wi-Fi profiles. This could lead to the device connecting to unintended networks, potentially exposing sensitive data or allowing for man-in-the-middle attacks. The…
-
Overview CVE-2025-11935 describes a potential vulnerability related to the implementation of TLS 1.3 pre-shared keys (PSK) that could lead to a bypass of Perfect Forward Secrecy (PFS). Specifically, a malicious or faulty server could potentially ignore a client’s request for PFS when using PSK, and the client would continue the connection without PFS. This happens if the server responds to a ClientHello containing `psk_dhe_ke` without a `key_share` extension. Reusing an authenticated PSK connection without the expected PFS on the client side weakens the overall security of the connection, as past session keys could be compromised if the PSK is later…
-
Overview CVE-2025-0504 is a medium severity vulnerability affecting Black Duck Software Composition Analysis (SCA) versions prior to 2025.10.0. This security flaw arises from overly broad user role permissions, specifically within the Project Manager role when coupled with Global User Read access. This combination allows Project Managers to access certain Project Administrator functionalities that should be restricted to users with higher privileges. While this vulnerability does not grant full system control, it poses a risk of unauthorized modification of project configurations and potential access to sensitive system information. Technical Details The vulnerability stems from the configuration of user role permissions within…
-
Overview A critical security vulnerability, identified as CVE-2025-11087, has been discovered in the Zegen Core plugin for WordPress. This vulnerability allows unauthenticated attackers to upload arbitrary files to the affected WordPress server. The risk stems from a Cross-Site Request Forgery (CSRF) vulnerability in the plugin’s file upload functionality. This could potentially lead to remote code execution if an attacker successfully exploits the vulnerability. This vulnerability affects versions up to and including 2.0.1 of the Zegen Core plugin. Technical Details The Zegen Core plugin fails to implement proper nonce validation and file type validation in the /custom-font-code/custom-fonts-uploads.php file. This means that…