Количество 19 519
Количество 19 519
CVE-2025-71081
ASoC: stm32: sai: fix OF node leak on probe
CVE-2025-71079
net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write
CVE-2025-71078
powerpc/64s/slb: Fix SLB multihit issue during SLB preload
CVE-2025-71077
tpm: Cap the number of PCR banks
CVE-2025-71075
scsi: aic94xx: fix use-after-free in device removal path
CVE-2025-71074
functionfs: fix the open/removal races
CVE-2025-71073
Input: lkkbd - disable pending work before freeing device
CVE-2025-71072
shmem: fix recovery on rename failures
CVE-2025-71069
f2fs: invalidate dentry cache on failed whiteout creation
CVE-2025-71068
svcrdma: bound check rq_pages index in inline path
CVE-2025-71067
ntfs: set dummy blocksize to read boot_block when mounting
CVE-2025-71066
net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change
CVE-2025-71065
f2fs: fix to avoid potential deadlock
CVE-2025-71064
net: hns3: using the num_tqps in the vf driver to apply for resources
CVE-2025-7069
HDF5 H5FSsection.c H5FS__sect_link_size heap-based overflow
CVE-2025-7068
HDF5 H5FL.c H5FL__malloc memory leak
CVE-2025-7067
HDF5 H5FScache.c H5FS__sinfo_serialize_node_cb heap-based overflow
CVE-2025-7039
Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()
CVE-2025-69873
ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation.
CVE-2025-69720
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-71081 ASoC: stm32: sai: fix OF node leak on probe | CVSS3: 7.1 | 0% Низкий | 2 месяца назад | |
CVE-2025-71079 net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
CVE-2025-71078 powerpc/64s/slb: Fix SLB multihit issue during SLB preload | CVSS3: 4.7 | 0% Низкий | 2 месяца назад | |
CVE-2025-71077 tpm: Cap the number of PCR banks | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
CVE-2025-71075 scsi: aic94xx: fix use-after-free in device removal path | CVSS3: 7 | 0% Низкий | 2 месяца назад | |
CVE-2025-71074 functionfs: fix the open/removal races | 0% Низкий | 2 месяца назад | ||
CVE-2025-71073 Input: lkkbd - disable pending work before freeing device | 0% Низкий | 25 дней назад | ||
CVE-2025-71072 shmem: fix recovery on rename failures | 0% Низкий | около 1 месяца назад | ||
CVE-2025-71069 f2fs: invalidate dentry cache on failed whiteout creation | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
CVE-2025-71068 svcrdma: bound check rq_pages index in inline path | CVSS3: 7.8 | 0% Низкий | 2 месяца назад | |
CVE-2025-71067 ntfs: set dummy blocksize to read boot_block when mounting | CVSS3: 7.1 | 0% Низкий | 2 месяца назад | |
CVE-2025-71066 net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change | CVSS3: 9.8 | 0% Низкий | около 1 месяца назад | |
CVE-2025-71065 f2fs: fix to avoid potential deadlock | CVSS3: 5 | 0% Низкий | 2 месяца назад | |
CVE-2025-71064 net: hns3: using the num_tqps in the vf driver to apply for resources | CVSS3: 9.8 | 0% Низкий | 2 месяца назад | |
CVE-2025-7069 HDF5 H5FSsection.c H5FS__sect_link_size heap-based overflow | 0% Низкий | 7 месяцев назад | ||
CVE-2025-7068 HDF5 H5FL.c H5FL__malloc memory leak | CVSS3: 3.3 | 0% Низкий | 7 месяцев назад | |
CVE-2025-7067 HDF5 H5FScache.c H5FS__sinfo_serialize_node_cb heap-based overflow | CVSS3: 3.3 | 0% Низкий | 7 месяцев назад | |
CVE-2025-7039 Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file() | CVSS3: 3.7 | 0% Низкий | 7 месяцев назад | |
CVE-2025-69873 ajv (Another JSON Schema Validator) before 8.18.0 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., "^(a|a)*$") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation. | 0% Низкий | около 1 месяца назад | ||
0% Низкий | 5 дней назад |
Уязвимостей на страницу