Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-59242 |
Windows Ancillary Function Driver for WinSock
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-10-14 | No |
Reported By
|
|
| CVE-2025-59254 |
Microsoft DWM Core Library
|
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-10-14 | No |
Reported By
namnp with Viettel Cyber Security
|
|
| CVE-2025-58722 |
Microsoft DWM Core Library
|
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
2025-10-14 | No |
Reported By
Varun Goel
Samuel Pope with MSRC |
|
| CVE-2025-24052 |
Windows Agere Modem Driver
|
Windows Agere Modem Driver Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
|
2025-10-14 | No |
Reported By
Anonymous
|
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-59271 |
Redis Enterprise
|
Redis Enterprise Elevation of Privilege Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
|
2025-10-09 | No |
Reported By
Chantal Olieman with Microsoft
Gary Wang with Microsoft Jordan Rodak with Microsoft |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-49844 |
Redis Lua Use-After-Free may lead to
|
Redis Lua Use-After-Free may lead to remote code execution
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|
2025-10-08 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-10729 |
Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows
|
Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG
No CVSS vector published
|
2025-10-07 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-9648 |
CivetWeb
|
Denial of Service in CivetWeb
No CVSS vector published
|
2025-10-03 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2025-55560 |
An issue in pytorch v2.7.0 can lead to a
|
An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch model consists of torch.Tensor.to_sparse() and torch.Tensor.to_dense() and is compiled by Inductor.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-02 | - | - | |
| CVE-2025-55558 |
A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a
|
A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a Denial of Service (DoS).
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-02 | - | - | |
| CVE-2025-55557 |
A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a
|
A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a Denial of Service (DoS).
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-02 | - | - |
| CVE | Module | CWE | Title Advisory text and compact technical context | Release | Exploited | Acknowledgement |
|---|---|---|---|---|---|---|
| CVE-2019-17414 |
tinylcy Vino through 2017-12-15 allows remote attackers to cause a
|
tinylcy Vino through 2017-12-15 allows remote attackers to cause a denial of service ("vn_get_string error: Resource temporarily unavailable" error and daemon crash) via a long URL.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2017-6837 |
WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a
|
WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2022-21626 |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial
|
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplie
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
2025-10-01 | - | - | |
| CVE-2022-21628 |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial
|
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run o
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
2025-10-01 | - | - | |
| CVE-2021-28543 |
Varnish varnish-modules before 0.17.1 allows remote attackers to cause a
|
Varnish varnish-modules before 0.17.1 allows remote attackers to cause a denial of service (daemon restart) in some configurations. This does not affect organizations that only install the Varnish Cache product; however, it is common to install both Varnish Cache and varnish-modules. Specifically, an assertion failure or NULL pointer dereference can be triggered in Varnish Cache through the varnish-modules header.append() and header.copy() functions. For some Varnish Configuration Language (VCL) files, this gives remote clients an opportunity to cause a Varnish Cache restart. A restart reduces overall availability and performance due to an increased number of cache misses, and may cause higher load on backend servers.
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L
|
2025-10-01 | - | - | |
| CVE-2011-5244 |
Multiple off-by-one errors in the (1) token and (2) linetoken functions in backend/dvi/mdvi-lib/afmparse.c in t1lib, as used in teTeX 3.0.x, GNOME evince, and possibly other products, allow remote attackers to cause a
|
Multiple off-by-one errors in the (1) token and (2) linetoken functions in backend/dvi/mdvi-lib/afmparse.c in t1lib, as used in teTeX 3.0.x, GNOME evince, and possibly other products, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a DVI file containing a crafted Adobe Font Metrics (AFM) file, different vulnerabilities than CVE-2010-2642 and CVE-2011-0433.
No CVSS vector published
|
2025-10-01 | - | - | |
| CVE-2020-25013 |
JetBrains ToolBox before version 1.18 is vulnerable to a
|
JetBrains ToolBox before version 1.18 is vulnerable to a Denial of Service attack via a browser protocol handler.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2020-25207 |
JetBrains ToolBox before version 1.18 is vulnerable to
|
JetBrains ToolBox before version 1.18 is vulnerable to Remote Code Execution via a browser protocol handler.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
2025-10-01 | - | - | |
| CVE-2010-2642 |
Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a
|
Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
No CVSS vector published
|
2025-10-01 | - | - | |
| CVE-2020-14150 |
GNU Bison before 3.5.4 allows attackers to cause a
|
GNU Bison before 3.5.4 allows attackers to cause a denial of service (application crash). NOTE: there is a risk only if Bison is used with untrusted input, and an observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug reports were intended to show that a crash may occur in Bison itself, not that a crash may occur in code that is generated by Bison.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2002-0318 |
FreeRADIUS RADIUS server allows remote attackers to cause a
|
FreeRADIUS RADIUS server allows remote attackers to cause a denial of service (CPU consumption) via a flood of Access-Request packets.
No CVSS vector published
|
2025-10-01 | - | - | |
| CVE-2024-42861 |
An issue in IEEE 802.1AS linuxptp v.4.2 and before allowing a remote attacker to cause a
|
An issue in IEEE 802.1AS linuxptp v.4.2 and before allowing a remote attacker to cause a denial of service via a crafted Pdelay_Req message to the time synchronization function
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2022-25345 |
Denial of Service (DoS)
|
Denial of Service (DoS)
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2017-8923 |
The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a
|
The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
2025-10-01 | - | - | |
| CVE-2022-25857 |
Denial of Service (DoS)
|
Denial of Service (DoS)
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2017-5835 |
libplist allows attackers to cause a
|
libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2021-3995 |
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a
|
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2021-3996 |
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a
|
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2016-4912 |
The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a
|
The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2022-47015 |
MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to
|
MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of Service. It is possible for function spider_db_mbase::print_warnings to dereference a null pointer.
CVSS vector: AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2022-4285 |
An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a
|
An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2022-47021 |
A null pointer dereference issue was discovered in functions op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 thru 0.12 allows attackers to cause
|
A null pointer dereference issue was discovered in functions op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 thru 0.12 allows attackers to cause denial of service or other unspecified impacts.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
2025-10-01 | - | - | |
| CVE-2020-35503 |
A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a
|
A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2020-35504 |
A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a
|
A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2022-0216 |
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a
|
A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2017-5836 |
The plist_free_data function libplist allows attackers to cause a
|
The plist_free_data function libplist allows attackers to cause a denial of service
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2017-6835 |
Vulnerability in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a
|
Vulnerability in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service via a crafted file.
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2017-6833 |
Vulnerability in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a
|
Vulnerability in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2025-55553 |
A syntax error in the component proxy_tensor.py of pytorch v2.7.0 allows attackers to cause a
|
A syntax error in the component proxy_tensor.py of pytorch v2.7.0 allows attackers to cause a Denial of Service (DoS).
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2022-31321 |
The foldername parameter in Bolt 5.1.7 was discovered to have incorrect input validation, allowing attackers to perform directory enumeration or cause a
|
The foldername parameter in Bolt 5.1.7 was discovered to have incorrect input validation, allowing attackers to perform directory enumeration or cause a Denial of Service (DoS) via a crafted input.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2020-27748 |
A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive
|
A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird.
CVSS vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
|
2025-10-01 | - | - | |
| CVE-2017-9120 |
PHP 7.x through 7.1.5 allows remote attackers to cause a
|
PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
2025-10-01 | - | - | |
| CVE-2017-6839 |
Integer overflow in modules/MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a
|
Integer overflow in modules/MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2022-42969 |
The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression
|
The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. Note: This has been disputed by multiple third parties as not being reproduceable and they argue this is not a valid vulnerability.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
2025-10-01 | - | - | |
| CVE-2017-12613 |
When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an
|
When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2017-5834 |
The parse_dict_node function in bplist.c in libplist allows attackers to cause a
|
The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2017-6829 |
The decodeSample function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a
|
The decodeSample function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2017-11548 |
The _tokenize_matrix function in audio_out.c in Xiph.Org libao 1.2.0 allows remote attackers to cause a
|
The _tokenize_matrix function in audio_out.c in Xiph.Org libao 1.2.0 allows remote attackers to cause a denial of service
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - | |
| CVE-2017-6834 |
Heap-based buffer overflow in the ulaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0, 0.2.7 allows remote attackers to cause a
|
Heap-based buffer overflow in the ulaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0, 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
2025-10-01 | - | - |