Количество 60 973
Количество 60 973

CVE-2025-61725
[net/mail: excessive CPU consumption in ParseAddress]

CVE-2025-61724
[net/textproto: excessive CPU consumption in Reader.ReadResponse]

CVE-2025-61723
[encoding/pem: quadratic complexity when parsing some invalid inputs]

CVE-2025-6170
A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

CVE-2025-61672
Synapse is an open source Matrix homeserver implementation. Lack of validation for device keys in Synapse before 1.138.3 and in Synapse 1.139.0 allow an attacker registered on the victim homeserver to degrade federation functionality, unpredictably breaking outbound federation to other homeservers. The issue is patched in Synapse 1.138.3, 1.138.4, 1.139.1, and 1.139.2. Note that even though 1.138.3 and 1.139.1 fix the vulnerability, they inadvertently introduced an unrelated regression. For this reason, the maintainers of Synapse recommend skipping these releases and upgrading straight to 1.138.4 and 1.139.2.

CVE-2025-61657
[Insert sticky header labels as text instead of HTML]

CVE-2025-61656
[Sanitize attributes unwrapped from data-ve-attributes]

CVE-2025-61655
[Properly escape and parse system messages]

CVE-2025-61654
[Exclude deleted entries when counting thanks]

CVE-2025-61653
[Add authorizeRead check for extracts endpoint]

CVE-2025-61652
[In API check user read permissions before showing PageInfo]

CVE-2025-61646
[Prevent leaking hidden usernames in Watchlist/RecentChanges]

CVE-2025-61645
[Fix i18n XSS in CodexTablePager]

CVE-2025-61643
[Don't send suppressed recent changes to RCFeeds]

CVE-2025-61642
[Escape submit button label for Codex-based HTMLForms]

CVE-2025-61641
[api: Disable maxsize in QueryAllPages in miser mode]

CVE-2025-61640
[Parse messages instead of inserting them as HTML]

CVE-2025-61639
[Use ManualLogEntry::getDeleted in ::getRecentChange]

CVE-2025-61638
[Sanitize data- attributes]

CVE-2025-61637
[Escape three system messages used by live preview]
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-61725 [net/mail: excessive CPU consumption in ParseAddress] | 7 дней назад | ||
![]() | CVE-2025-61724 [net/textproto: excessive CPU consumption in Reader.ReadResponse] | 7 дней назад | ||
![]() | CVE-2025-61723 [encoding/pem: quadratic complexity when parsing some invalid inputs] | 7 дней назад | ||
![]() | CVE-2025-6170 A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections. | CVSS3: 2.5 | 0% Низкий | 4 месяца назад |
![]() | CVE-2025-61672 Synapse is an open source Matrix homeserver implementation. Lack of validation for device keys in Synapse before 1.138.3 and in Synapse 1.139.0 allow an attacker registered on the victim homeserver to degrade federation functionality, unpredictably breaking outbound federation to other homeservers. The issue is patched in Synapse 1.138.3, 1.138.4, 1.139.1, and 1.139.2. Note that even though 1.138.3 and 1.139.1 fix the vulnerability, they inadvertently introduced an unrelated regression. For this reason, the maintainers of Synapse recommend skipping these releases and upgrading straight to 1.138.4 and 1.139.2. | 0% Низкий | 9 дней назад | |
![]() | CVE-2025-61657 [Insert sticky header labels as text instead of HTML] | 10 дней назад | ||
![]() | CVE-2025-61656 [Sanitize attributes unwrapped from data-ve-attributes] | 10 дней назад | ||
![]() | CVE-2025-61655 [Properly escape and parse system messages] | 10 дней назад | ||
![]() | CVE-2025-61654 [Exclude deleted entries when counting thanks] | 10 дней назад | ||
![]() | CVE-2025-61653 [Add authorizeRead check for extracts endpoint] | 10 дней назад | ||
![]() | CVE-2025-61652 [In API check user read permissions before showing PageInfo] | 10 дней назад | ||
![]() | CVE-2025-61646 [Prevent leaking hidden usernames in Watchlist/RecentChanges] | 10 дней назад | ||
![]() | CVE-2025-61645 [Fix i18n XSS in CodexTablePager] | 10 дней назад | ||
![]() | CVE-2025-61643 [Don't send suppressed recent changes to RCFeeds] | 10 дней назад | ||
![]() | CVE-2025-61642 [Escape submit button label for Codex-based HTMLForms] | 10 дней назад | ||
![]() | CVE-2025-61641 [api: Disable maxsize in QueryAllPages in miser mode] | 10 дней назад | ||
![]() | CVE-2025-61640 [Parse messages instead of inserting them as HTML] | 10 дней назад | ||
![]() | CVE-2025-61639 [Use ManualLogEntry::getDeleted in ::getRecentChange] | 10 дней назад | ||
![]() | CVE-2025-61638 [Sanitize data- attributes] | 10 дней назад | ||
![]() | CVE-2025-61637 [Escape three system messages used by live preview] | 10 дней назад |
Уязвимостей на страницу