Логотип exploitDog
source:"msrc"
Консоль
Логотип exploitDog

exploitDog

source:"msrc"

Количество 17 873

Количество 17 873

msrc логотип

CVE-2025-8194

около 2 месяцев назад

Tarfile infinite loop during parsing with negative member offset

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-8177

около 2 месяцев назад

LibTIFF thumbnail.c setrow buffer overflow

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2025-8176

около 2 месяцев назад

LibTIFF tiffmedian.c get_histogram use after free

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2025-8114

около 2 месяцев назад

: null pointer dereference in libssh kex session id calculation

EPSS: Низкий
msrc логотип

CVE-2025-8011

3 месяца назад

Chromium: CVE-2025-8011 Type Confusion in V8

EPSS: Низкий
msrc логотип

CVE-2025-8010

3 месяца назад

Chromium: CVE-2025-8010 Type Confusion in V8

EPSS: Низкий
msrc логотип

CVE-2025-7783

около 2 месяцев назад

Usage of unsafe random function in form-data for choosing boundary

EPSS: Низкий
msrc логотип

CVE-2025-7657

4 месяца назад

Chromium: CVE-2025-7657 Use after free in WebRTC

EPSS: Низкий
msrc логотип

CVE-2025-7656

4 месяца назад

Chromium: CVE-2025-7656 Integer overflow in V8

EPSS: Низкий
msrc логотип

CVE-2025-7546

3 месяца назад

GNU Binutils elf.c bfd_elf_set_group_contents out-of-bounds write

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2025-7545

3 месяца назад

GNU Binutils objcopy.c copy_section heap-based overflow

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2025-7519

3 месяца назад

Polkit: xml policy file with a large number of nested elements may lead to out-of-bounds write

CVSS3: 6.7
EPSS: Низкий
msrc логотип

CVE-2025-7458

3 месяца назад

SQLite integer overflow in key info allocation may lead to information disclosure.

CVSS3: 9.1
EPSS: Низкий
msrc логотип

CVE-2025-7425

около 2 месяцев назад

Libxslt: heap use-after-free in libxslt caused by atype corruption in xmlattrptr

EPSS: Низкий
msrc логотип

CVE-2025-7424

около 2 месяцев назад

Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes

EPSS: Низкий
msrc логотип

CVE-2025-7395

около 2 месяцев назад

Domain Name Validation Bypass with Apple Native Certificate Validation

EPSS: Низкий
msrc логотип

CVE-2025-7394

около 2 месяцев назад

In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RAND_bytes() and doing fork() operations. This only affects applications explicitly calling RAND_bytes() after fork() and does not affect any internal TLS operations. Although RAND_bytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RAND_poll(), an additional code change was also made in wolfSSL to make RAND_bytes() behave similar to OpenSSL after a fork() call without calling RAND_poll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report.

EPSS: Низкий
msrc логотип

CVE-2025-7345

4 месяца назад

Gdk‑pixbuf: heap‑buffer‑overflow in gdk‑pixbuf

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-7339

около 2 месяцев назад

on-headers vulnerable to http response header manipulation

EPSS: Низкий
msrc логотип

CVE-2025-7207

около 2 месяцев назад

mruby nregs codegen.c scope_new heap-based overflow

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
msrc логотип
CVE-2025-8194

Tarfile infinite loop during parsing with negative member offset

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-8177

LibTIFF thumbnail.c setrow buffer overflow

CVSS3: 5.3
0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-8176

LibTIFF tiffmedian.c get_histogram use after free

CVSS3: 5.3
0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-8114

: null pointer dereference in libssh kex session id calculation

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-8011

Chromium: CVE-2025-8011 Type Confusion in V8

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-8010

Chromium: CVE-2025-8010 Type Confusion in V8

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-7783

Usage of unsafe random function in form-data for choosing boundary

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-7657

Chromium: CVE-2025-7657 Use after free in WebRTC

0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-7656

Chromium: CVE-2025-7656 Integer overflow in V8

0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-7546

GNU Binutils elf.c bfd_elf_set_group_contents out-of-bounds write

CVSS3: 5.3
0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-7545

GNU Binutils objcopy.c copy_section heap-based overflow

CVSS3: 5.3
0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-7519

Polkit: xml policy file with a large number of nested elements may lead to out-of-bounds write

CVSS3: 6.7
0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-7458

SQLite integer overflow in key info allocation may lead to information disclosure.

CVSS3: 9.1
0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-7425

Libxslt: heap use-after-free in libxslt caused by atype corruption in xmlattrptr

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-7424

Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-7395

Domain Name Validation Bypass with Apple Native Certificate Validation

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-7394

In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RAND_bytes() and doing fork() operations. This only affects applications explicitly calling RAND_bytes() after fork() and does not affect any internal TLS operations. Although RAND_bytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RAND_poll(), an additional code change was also made in wolfSSL to make RAND_bytes() behave similar to OpenSSL after a fork() call without calling RAND_poll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report.

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-7345

Gdk‑pixbuf: heap‑buffer‑overflow in gdk‑pixbuf

CVSS3: 7.5
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-7339

on-headers vulnerable to http response header manipulation

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-7207

mruby nregs codegen.c scope_new heap-based overflow

0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу