Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation. Depending on the privileges associated with the exploited component, an attacker could then install programs; view, change, or delete data; or create new accounts with full rights.
More Stories
USN-7372-1: Varnish vulnerability
Martin van Kervel Smedshammer discovered that Varnish did not properly sanitize certain HTTP headers. A remote attacker could possibly use...
GitHub Actions Supply Chain Attack
What is the Attack?Recently, a popular third-party GitHub Action tj-actions/changed-files GitHub Action (CVE-2025-30066)- used by over 23,000 repositories- was compromised,...
suricata-7.0.10-1.el9
FEDORA-EPEL-2025-46a02bfa95 Packages in this update: suricata-7.0.10-1.el9 Update description: This is an extra release to address a critical issue in 7.0.9...
suricata-7.0.10-1.el8
FEDORA-EPEL-2025-811cbc0ed6 Packages in this update: suricata-7.0.10-1.el8 Update description: This is an extra release to address a critical issue in 7.0.9...
suricata-7.0.10-1.fc41
FEDORA-2025-5fa61dc843 Packages in this update: suricata-7.0.10-1.fc41 Update description: This is an extra release to address a critical issue in 7.0.9...
suricata-7.0.10-1.fc40
FEDORA-2025-2a295896e6 Packages in this update: suricata-7.0.10-1.fc40 Update description: This is an extra release to address a critical issue in 7.0.9...