Логотип exploitDog
bind:CVE-2025-2723
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-2723

Количество 5

Количество 5

ubuntu логотип

CVE-2025-2723

6 месяцев назад

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that "[the] call is invalid [as] the buffer pointed to by "data" must have "len" valid bytes." The documentation was fixed to make that clear.

EPSS: Низкий
redhat логотип

CVE-2025-2723

6 месяцев назад

A flaw was found in the GNOME libgsf package, affecting the gsf_property_settings_collec function. Manipulation of the n_alloced_params argument can lead to a heap-based buffer overflow.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-2723

6 месяцев назад

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that "[the] call is invalid [as] the buffer pointed to by "data" must have "len" valid bytes." The documentation was fixed to make that clear.

EPSS: Низкий
github логотип

GHSA-vx3m-9554-cpqq

6 месяцев назад

A vulnerability was found in GNOME libgsf up to 1.14.53. It has been rated as critical. This issue affects the function gsf_property_settings_collec. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Attacking locally is a requirement. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2025-07134

6 месяцев назад

Уязвимость функции gsf_property_settings_collec библиотеки структурированных файлов The GNOME Project libgsf, позволяющая нарушителю выполнить произвольный код

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-2723

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that "[the] call is invalid [as] the buffer pointed to by "data" must have "len" valid bytes." The documentation was fixed to make that clear.

6 месяцев назад
redhat логотип
CVE-2025-2723

A flaw was found in the GNOME libgsf package, affecting the gsf_property_settings_collec function. Manipulation of the n_alloced_params argument can lead to a heap-based buffer overflow.

CVSS3: 5.3
6 месяцев назад
nvd логотип
CVE-2025-2723

Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The code maintainer explains that "[the] call is invalid [as] the buffer pointed to by "data" must have "len" valid bytes." The documentation was fixed to make that clear.

6 месяцев назад
github логотип
GHSA-vx3m-9554-cpqq

A vulnerability was found in GNOME libgsf up to 1.14.53. It has been rated as critical. This issue affects the function gsf_property_settings_collec. The manipulation of the argument n_alloced_params leads to heap-based buffer overflow. Attacking locally is a requirement. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 5.3
6 месяцев назад
fstec логотип
BDU:2025-07134

Уязвимость функции gsf_property_settings_collec библиотеки структурированных файлов The GNOME Project libgsf, позволяющая нарушителю выполнить произвольный код

CVSS3: 5.3
6 месяцев назад

Уязвимостей на страницу