Количество 45 010
Количество 45 010
CVE-2026-23533
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the RDPGFX ClearCodec decode path when maliciously crafted residual data causes out-of-bounds writes during color output. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
CVE-2026-23532
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the FreeRDP client’s `gdi_SurfaceToSurface` path due to a mismatch between destination rectangle clamping and the actual copy size. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
CVE-2026-23531
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, in ClearCodec, when `glyphData` is present, `clear_decompress` calls `freerdp_image_copy_no_overlap` without validating the destination rectangle, allowing an out-of-bounds read/write via crafted RDPGFX surface updates. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
CVE-2026-23530
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0,`freerdp_bitmap_decompress_planar` does not validate `nSrcWidth`/`nSrcHeight` against `planar->maxWidth`/`maxHeight` before RLE decode. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
CVE-2026-23527
H3 is a minimal H(TTP) framework built for high performance and portability. Prior to 1.15.5, there is a critical HTTP Request Smuggling vulnerability. readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explicitly looks for "chunked", but per the RFC, this header should be case-insensitive. This vulnerability is fixed in 1.15.5.
CVE-2026-23490
pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2.
CVE-2026-2327
Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.
CVE-2026-23270
No description is available for this CVE.
CVE-2026-23269
No description is available for this CVE.
CVE-2026-23268
No description is available for this CVE.
CVE-2026-23267
No description is available for this CVE.
CVE-2026-23266
No description is available for this CVE.
CVE-2026-23265
No description is available for this CVE.
CVE-2026-23264
No description is available for this CVE.
CVE-2026-23263
No description is available for this CVE.
CVE-2026-23262
A memory corruption vulnerability was found in the Linux kernel's Google Virtual Ethernet (gve) driver. The driver and NIC share a memory region for statistics reporting, with the NIC calculating its write offset based on the region size. When queue count is increased, the driver resizes the stats region, but the NIC continues using the old offset calculation, causing out-of-bounds writes past the allocated buffer and corrupting kernel memory.
CVE-2026-23261
No description is available for this CVE.
CVE-2026-23260
No description is available for this CVE.
CVE-2026-23259
No description is available for this CVE.
CVE-2026-23258
No description is available for this CVE.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-23533 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the RDPGFX ClearCodec decode path when maliciously crafted residual data causes out-of-bounds writes during color output. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue. | CVSS3: 7.6 | 0% Низкий | 2 месяца назад | |
CVE-2026-23532 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the FreeRDP client’s `gdi_SurfaceToSurface` path due to a mismatch between destination rectangle clamping and the actual copy size. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue. | CVSS3: 7.6 | 0% Низкий | 2 месяца назад | |
CVE-2026-23531 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, in ClearCodec, when `glyphData` is present, `clear_decompress` calls `freerdp_image_copy_no_overlap` without validating the destination rectangle, allowing an out-of-bounds read/write via crafted RDPGFX surface updates. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue. | CVSS3: 7.6 | 0% Низкий | 2 месяца назад | |
CVE-2026-23530 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0,`freerdp_bitmap_decompress_planar` does not validate `nSrcWidth`/`nSrcHeight` against `planar->maxWidth`/`maxHeight` before RLE decode. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue. | CVSS3: 7.6 | 0% Низкий | 2 месяца назад | |
CVE-2026-23527 H3 is a minimal H(TTP) framework built for high performance and portability. Prior to 1.15.5, there is a critical HTTP Request Smuggling vulnerability. readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explicitly looks for "chunked", but per the RFC, this header should be case-insensitive. This vulnerability is fixed in 1.15.5. | CVSS3: 8.9 | 0% Низкий | 2 месяца назад | |
CVE-2026-23490 pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2. | CVSS3: 7.5 | 0% Низкий | 2 месяца назад | |
CVE-2026-2327 Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition. | CVSS3: 7.5 | 0% Низкий | около 1 месяца назад | |
CVE-2026-23270 No description is available for this CVE. | CVSS3: 7 | 0% Низкий | 11 дней назад | |
CVE-2026-23269 No description is available for this CVE. | 0% Низкий | 11 дней назад | ||
CVE-2026-23268 No description is available for this CVE. | 0% Низкий | 11 дней назад | ||
CVE-2026-23267 No description is available for this CVE. | 0% Низкий | 11 дней назад | ||
CVE-2026-23266 No description is available for this CVE. | 0% Низкий | 11 дней назад | ||
CVE-2026-23265 No description is available for this CVE. | 0% Низкий | 11 дней назад | ||
CVE-2026-23264 No description is available for this CVE. | 0% Низкий | 11 дней назад | ||
CVE-2026-23263 No description is available for this CVE. | 0% Низкий | 11 дней назад | ||
CVE-2026-23262 A memory corruption vulnerability was found in the Linux kernel's Google Virtual Ethernet (gve) driver. The driver and NIC share a memory region for statistics reporting, with the NIC calculating its write offset based on the region size. When queue count is increased, the driver resizes the stats region, but the NIC continues using the old offset calculation, causing out-of-bounds writes past the allocated buffer and corrupting kernel memory. | CVSS3: 5.5 | 0% Низкий | 11 дней назад | |
CVE-2026-23261 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 11 дней назад | |
CVE-2026-23260 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 11 дней назад | |
CVE-2026-23259 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 11 дней назад | |
CVE-2026-23258 No description is available for this CVE. | CVSS3: 5.5 | 0% Низкий | 11 дней назад |
Уязвимостей на страницу