Логотип exploitDog
source:"ubuntu"
Консоль
Логотип exploitDog

exploitDog

source:"ubuntu"

Количество 61 652

Количество 61 652

ubuntu логотип

CVE-2025-66035

4 дня назад

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend...

EPSS: Низкий
ubuntu логотип

CVE-2025-66031

4 дня назад

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

EPSS: Низкий
ubuntu логотип

CVE-2025-66030

4 дня назад

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

EPSS: Низкий
ubuntu логотип

CVE-2025-6601

около 1 месяца назад

GitLab has remediated an issue in GitLab EE affecting all versions from 18.4 before 18.4.3, and 18.5 before 18.5.1 that under certain conditions could have allowed authenticated users to gain unauthorized project access by exploiting the access request approval workflow.

CVSS3: 2.7
EPSS: Низкий
ubuntu логотип

CVE-2025-66019

5 дней назад

pypdf is a free and open-source pure-python PDF library. Prior to version 6.4.0, an attacker who uses this vulnerability can craft a PDF which leads to a memory usage of up to 1 GB per stream. This requires parsing the content stream of a page using the LZWDecode filter. This issue has been patched in version 6.4.0.

EPSS: Низкий
ubuntu логотип

CVE-2025-6597

5 месяцев назад

[Unknown description]

EPSS: Низкий
ubuntu логотип

CVE-2025-6596

5 месяцев назад

[Unknown description]

EPSS: Низкий
ubuntu логотип

CVE-2025-6595

5 месяцев назад

[Unknown description]

EPSS: Низкий
ubuntu логотип

CVE-2025-6594

5 месяцев назад

[Unknown description]

EPSS: Низкий
ubuntu логотип

CVE-2025-6593

5 месяцев назад

[Unknown description]

EPSS: Низкий
ubuntu логотип

CVE-2025-6592

5 месяцев назад

[Unknown description]

EPSS: Низкий
ubuntu логотип

CVE-2025-6591

5 месяцев назад

[Unknown description]

EPSS: Низкий
ubuntu логотип

CVE-2025-6590

5 месяцев назад

[Unknown description]

EPSS: Низкий
ubuntu логотип

CVE-2025-6589

5 месяцев назад

[Unknown description]

EPSS: Низкий
ubuntu логотип

CVE-2025-6558

5 месяцев назад

Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

CVSS3: 8.8
EPSS: Низкий
ubuntu логотип

CVE-2025-6557

5 месяцев назад

Insufficient data validation in DevTools in Google Chrome on Windows prior to 138.0.7204.49 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)

CVSS3: 5.4
EPSS: Низкий
ubuntu логотип

CVE-2025-6556

5 месяцев назад

Insufficient policy enforcement in Loader in Google Chrome prior to 138.0.7204.49 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)

CVSS3: 5.4
EPSS: Низкий
ubuntu логотип

CVE-2025-6555

5 месяцев назад

Use after free in Animation in Google Chrome prior to 138.0.7204.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

CVSS3: 5.4
EPSS: Низкий
ubuntu логотип

CVE-2025-65501

7 дней назад

Null pointer dereference in coap_dtls_info_callback() in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a DTLS handshake where SSL_get_app_data() returns NULL.

CVSS3: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2025-65500

7 дней назад

NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-66035

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend...

0%
Низкий
4 дня назад
ubuntu логотип
CVE-2025-66031

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

0%
Низкий
4 дня назад
ubuntu логотип
CVE-2025-66030

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

0%
Низкий
4 дня назад
ubuntu логотип
CVE-2025-6601

GitLab has remediated an issue in GitLab EE affecting all versions from 18.4 before 18.4.3, and 18.5 before 18.5.1 that under certain conditions could have allowed authenticated users to gain unauthorized project access by exploiting the access request approval workflow.

CVSS3: 2.7
0%
Низкий
около 1 месяца назад
ubuntu логотип
CVE-2025-66019

pypdf is a free and open-source pure-python PDF library. Prior to version 6.4.0, an attacker who uses this vulnerability can craft a PDF which leads to a memory usage of up to 1 GB per stream. This requires parsing the content stream of a page using the LZWDecode filter. This issue has been patched in version 6.4.0.

0%
Низкий
5 дней назад
ubuntu логотип
CVE-2025-6597

[Unknown description]

5 месяцев назад
ubuntu логотип
CVE-2025-6596

[Unknown description]

5 месяцев назад
ubuntu логотип
CVE-2025-6595

[Unknown description]

5 месяцев назад
ubuntu логотип
CVE-2025-6594

[Unknown description]

5 месяцев назад
ubuntu логотип
CVE-2025-6593

[Unknown description]

5 месяцев назад
ubuntu логотип
CVE-2025-6592

[Unknown description]

5 месяцев назад
ubuntu логотип
CVE-2025-6591

[Unknown description]

5 месяцев назад
ubuntu логотип
CVE-2025-6590

[Unknown description]

5 месяцев назад
ubuntu логотип
CVE-2025-6589

[Unknown description]

5 месяцев назад
ubuntu логотип
CVE-2025-6558

Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

CVSS3: 8.8
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-6557

Insufficient data validation in DevTools in Google Chrome on Windows prior to 138.0.7204.49 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)

CVSS3: 5.4
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-6556

Insufficient policy enforcement in Loader in Google Chrome prior to 138.0.7204.49 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)

CVSS3: 5.4
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-6555

Use after free in Animation in Google Chrome prior to 138.0.7204.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

CVSS3: 5.4
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-65501

Null pointer dereference in coap_dtls_info_callback() in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a DTLS handshake where SSL_get_app_data() returns NULL.

CVSS3: 4.3
0%
Низкий
7 дней назад
ubuntu логотип
CVE-2025-65500

NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.

CVSS3: 4.3
0%
Низкий
7 дней назад

Уязвимостей на страницу