| CVE-2021-42380 |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function |
Important |
busybox |
否 |
完成修复 |
2024-12-04 |
2026-01-05 |
| CVE-2021-40265 |
A heap overflow bug exists FreeImage before 1.18.0 via ofLoad function in PluginJPEG.cpp. |
Important |
freeimage |
否 |
完成修复 |
2024-12-04 |
2026-01-07 |
| CVE-2021-37501 |
Buffer Overflow vulnerability in HDFGroup hdf5-h5dump 1.12.0 through 1.13.0 allows attackers to cause a denial of service via h5tools_str_sprint in /hdf5/tools/lib/h5tools_str.c. |
Important |
hdf5 |
否 |
完成修复 |
2024-12-04 |
2026-01-05 |
| CVE-2021-33571 |
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) |
Important |
python-django |
否 |
完成修复 |
2024-12-04 |
2026-01-04 |
| CVE-2021-32765 |
Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow. Users of hiredis who are unable to update may set the [maxelements](https://github.com/redis/hiredis#reader-max-array-elements) context option to a value small enough that no overflow is possible. |
Important |
hiredis |
否 |
完成修复 |
2024-12-04 |
2026-01-05 |
| CVE-2021-31542 |
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names. |
Important |
python-django |
否 |
完成修复 |
2024-12-03 |
2026-01-04 |
| CVE-2021-28831 |
decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data. |
Important |
busybox |
否 |
完成修复 |
2024-12-03 |
2026-01-05 |
| CVE-2021-20313 |
A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality. |
Important |
ImageMagick |
否 |
完成修复 |
2024-12-03 |
2026-01-05 |
| CVE-2021-20235 |
There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data if CURVE/ZAP authentication is not enabled. The greatest impact of this flaw is to application availability, data integrity, and confidentiality. |
Important |
zeromq |
否 |
完成修复 |
2024-12-03 |
2026-01-04 |
| CVE-2020-17354 |
LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used. |
Important |
lilypond |
否 |
完成修复 |
2024-12-03 |
2026-01-05 |
| CVE-2020-13949 |
In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service. |
Important |
thrift |
否 |
完成修复 |
2024-12-03 |
2026-01-05 |
| CVE-2019-25050 |
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset). |
Important |
gdal |
否 |
完成修复 |
2024-12-03 |
2026-01-07 |
| CVE-2014-125024 |
A vulnerability was found in FFmpeg 2.0. It has been rated as critical. Affected by this issue is the function lag_decode_frame. The manipulation leads to memory corruption. The attack may be launched remotely. It is recommended to apply a patch to fix this issue. |
Important |
ffmpeg |
否 |
完成修复 |
2024-12-03 |
2025-12-06 |
| CVE-2024-26895 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-02 |
2026-01-23 |
| CVE-2024-10041 |
A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications. |
Moderate |
pam |
否 |
完成修复 |
2024-12-02 |
2026-01-25 |
| CVE-2021-22116 |
RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. A malicious user can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled. |
Important |
rabbitmq-server |
否 |
完成修复 |
2024-11-30 |
2026-01-04 |
| CVE-2024-10963 |
A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals. |
Important |
pam |
否 |
完成修复 |
2024-11-29 |
2025-12-29 |
| CVE-2024-2511 |
Issue summary: Some non-default TLS server configurations can cause unbounded\nmemory growth when processing TLSv1.3 sessions\n\nImpact summary: An attacker may exploit certain server configurations to trigger\nunbounded memory growth that would lead to a Denial of Service\n\nThis problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is\nbeing used (but not if early_data support is also configured and the default\nanti-replay protection is in use). In this case, under certain conditions, the\nsession cache can get into an incorrect state and it will fail to flush properly\nas it fills. The session cache will continue to grow in an unbounded manner. A\nmalicious client could deliberately create the scenario for this failure to\nforce a Denial of Service. It may also happen by accident in normal operation.\n\nThis issue only affects TLS servers supporting TLSv1.3. It does not affect TLS\nclients.\n\nThe FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL\n1.0.2 is also not affected by this issue. |
Low |
openssl |
否 |
完成修复 |
2024-11-27 |
2026-01-05 |
| CVE-2024-44185 |
The issue was addressed with improved checks. This issue is fixed in tvOS 17.6, visionOS 1.3, Safari 17.6, watchOS 10.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash. |
Important |
webkit2gtk3 |
否 |
完成修复 |
2024-11-26 |
2026-01-04 |
| CVE-2024-27851 |
The issue was addressed with improved bounds checks. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing maliciously crafted web content may lead to arbitrary code execution. |
Important |
webkit2gtk3 |
否 |
完成修复 |
2024-11-26 |
2026-01-04 |
| CVE-2024-27820 |
The issue was addressed with improved memory handling. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. Processing web content may lead to arbitrary code execution. |
Important |
webkit2gtk3 |
否 |
完成修复 |
2024-11-26 |
2026-01-04 |
| CVE-2024-11698 |
A flaw in handling fullscreen transitions may have inadvertently caused the application to become stuck in fullscreen mode when a modal dialog was opened during the transition. This issue left users unable to exit fullscreen mode using standard actions like pressing "Esc" or accessing right-click menus, resulting in a disrupted browsing experience until the browser is restarted. \n*This bug only affects the application when running on macOS. Other operating systems are unaffected.* This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5. |
Low |
firefox, thunderbird |
否 |
完成修复 |
2024-11-26 |
2026-01-24 |
| CVE-2022-48997 |
In the Linux kernel, the following vulnerability has been resolved:\nchar: tpm: Protect tpm_pm_suspend with locks\nCurrently tpm transactions are executed unconditionally in\ntpm_pm_suspend() function, which may lead to races with other tpm\naccessors in the system.\nSpecifically, the hw_random tpm driver makes use of tpm_get_random(),\nand this function is called in a loop from a kthread, which means it's\nnot frozen alongside userspace, and so can race with the work done\nduring system suspend:\ntpm tpm0: tpm_transmit: tpm_recv: error -52\ntpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics\nCPU: 0 PID: 1 Comm: init Not tainted 6.1.0-rc5+ #135\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014\nCall Trace:\ntpm_tis_status.cold+0x19/0x20\ntpm_transmit+0x13b/0x390\ntpm_transmit_cmd+0x20/0x80\ntpm1_pm_suspend+0xa6/0x110\ntpm_pm_suspend+0x53/0x80\n__pnp_bus_suspend+0x35/0xe0\n__device_suspend+0x10f/0x350\nFix this by calling tpm_try_get_ops(), which itself is a wrapper around\ntpm_chip_start(), but takes the appropriate mutex.\n[Jason: reworked commit message, added metadata] |
Moderate |
kernel |
否 |
完成修复 |
2024-11-26 |
2026-01-21 |
| CVE-2024-33875 |
HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5O__layout_encode in H5Olayout.c, resulting in the corruption of the instruction pointer. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-33873 |
HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5D__scatter_mem in H5Dscatgath.c. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32624 |
HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T__ref_mem_setnull in H5Tref.c (called from H5T__conv_ref in H5Tconv.c), resulting in the corruption of the instruction pointer. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32623 |
HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5VM_array_fill in H5VM.c (called from H5S_select_elements in H5Spoint.c). |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32622 |
HDF5 Library through 1.14.3 contains a out-of-bounds read operation in H5FL_arr_malloc in H5FL.c (called from H5S_set_extent_simple in H5S.c). |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32621 |
HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5HG_read in H5HG.c (called from H5VL__native_blob_get in H5VLnative_blob.c), resulting in the corruption of the instruction pointer. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32620 |
HDF5 Library through 1.14.3 contains a heap-based buffer over-read in H5F_addr_decode_len in H5Fint.c, resulting in the corruption of the instruction pointer. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32619 |
HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T_copy_reopen in H5T.c, resulting in the corruption of the instruction pointer. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32618 |
HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T__get_native_type in H5Tnative.c, resulting in the corruption of the instruction pointer. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32617 |
HDF5 Library through 1.14.3 contains a heap-based buffer over-read caused by the unsafe use of strdup in H5MM_xstrdup in H5MM.c (called from H5G__ent_to_link in H5Glink.c). |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32616 |
HDF5 Library through 1.14.3 contains a heap-based buffer over-read in H5O__dtype_encode_helper in H5Odtype.c. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32614 |
HDF5 Library through 1.14.3 has a SEGV in H5VM_memcpyvv in H5VM.c. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32611 |
HDF5 Library through 1.14.3 may use an uninitialized value in H5A__attr_release_table in H5Aint.c. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32610 |
HDF5 Library through 1.14.3 has a SEGV in H5T_close_real in H5T.c, resulting in a corrupted instruction pointer. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32607 |
HDF5 Library through 1.14.3 has a SEGV in H5A__close in H5Aint.c, resulting in the corruption of the instruction pointer. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32606 |
HDF5 Library through 1.14.3 may attempt to dereference uninitialized values in h5tools_str_sprint in tools/lib/h5tools_str.c (called from h5tools_dump_simple_data in tools/lib/h5tools_dump.c). |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32605 |
HDF5 Library through 1.14.3 has a heap-based buffer over-read in H5VM_memcpyvv in H5VM.c (called from H5D__compact_readvv in H5Dcompact.c). |
Important |
hdf5 |
否 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2024-32230 |
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size-param bug at libavcodec/mpegvideo_enc.c:1216:21 in load_input_picture in FFmpeg7.0 |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2024-32229 |
FFmpeg 7.0 contains a heap-buffer-overflow at libavfilter/vf_tiltandshift.c:189:5 in copy_column. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2024-31583 |
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp. |
Important |
pytorch |
否 |
完成修复 |
2024-11-25 |
2026-01-04 |
| CVE-2024-31582 |
FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted input. |
Important |
ffmpeg |
是 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2024-31581 |
FFmpeg version n6.1 was discovered to contain an improper validation of array index vulnerability in libavcodec/cbs_h266_syntax_template.c. This vulnerability allows attackers to cause undefined behavior within the application. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2024-29943 |
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1. |
Critical |
firefox |
否 |
完成修复 |
2024-11-25 |
2026-01-04 |
| CVE-2024-29509 |
Artifex Ghostscript before 10.03.0 has a heap-based overflow when PDFPassword (e.g., for runpdf) has a \\000 byte in the middle. |
Important |
ghostscript |
否 |
完成修复 |
2024-11-25 |
2026-01-06 |
| CVE-2024-29506 |
Artifex Ghostscript before 10.03.0 has a stack-based buffer overflow in the pdfi_apply_filter() function via a long PDF filter name. |
Important |
ghostscript |
否 |
完成修复 |
2024-11-25 |
2026-01-06 |
| CVE-2024-23271 |
A logic issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, Safari 17.3, tvOS 17.3, macOS Sonoma 14.3, watchOS 10.3. A malicious website may cause unexpected cross-origin behavior. |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2024-11-25 |
2026-01-04 |
| CVE-2024-22861 |
Integer overflow vulnerability in FFmpeg before n6.1, allows attackers to cause a denial of service (DoS) via the avcodec/osq module. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2024-22749 |
GPAC v2.3 was detected to contain a buffer overflow via the function gf_isom_new_generic_sample_description function in the isomedia/isom_write.c:4577 |
Important |
gpac |
否 |
完成修复 |
2024-11-25 |
2026-01-04 |
| CVE-2024-22391 |
A heap-based buffer overflow vulnerability exists in the LookupTable::SetLUT functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. |
Important |
gdcm |
否 |
完成修复 |
2024-11-25 |
2026-01-07 |
| CVE-2024-22373 |
An out-of-bounds write vulnerability exists in the JPEG2000Codec::DecodeByStreamsCommon functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. |
Important |
gdcm |
否 |
完成修复 |
2024-11-25 |
2026-01-07 |
| CVE-2024-0760 |
A malicious client can send many DNS messages over TCP, potentially causing the server to become unstable while the attack is in progress. The server may recover after the attack ceases. Use of ACLs will not mitigate the attack. \nThis issue affects BIND 9 versions 9.18.1 through 9.18.27, 9.19.0 through 9.19.24, and 9.18.11-S1 through 9.18.27-S1. |
Important |
bind |
否 |
完成修复 |
2024-11-25 |
2026-01-06 |
| CVE-2024-0745 |
The WebAudio `OscillatorNode` object was susceptible to a stack buffer overflow. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 122. |
Moderate |
firefox |
否 |
完成修复 |
2024-11-25 |
2026-01-24 |
| CVE-2024-0744 |
In some circumstances, JIT compiled code could have dereferenced a wild pointer value. This could have led to an exploitable crash. This vulnerability affects Firefox < 122. |
Moderate |
firefox |
否 |
完成修复 |
2024-11-25 |
2026-01-24 |
| CVE-2024-0211 |
DOCSIS dissector crash in Wireshark 4.2.0 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2024-11-25 |
2026-01-05 |
| CVE-2024-0210 |
Zigbee TLV dissector crash in Wireshark 4.2.0 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2024-11-25 |
2026-01-05 |
| CVE-2024-0209 |
IEEE 1609.2 dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2024-11-25 |
2026-01-05 |
| CVE-2024-0208 |
GVCP dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2024-11-25 |
2026-01-05 |
| CVE-2024-0207 |
HTTP3 dissector crash in Wireshark 4.2.0 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2024-11-25 |
2026-01-05 |
| CVE-2024-0132 |
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. |
Important |
nvidia-container-toolkit |
否 |
完成修复 |
2024-11-25 |
2026-01-05 |
| CVE-2023-5855 |
Use after free in Reading Mode in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium) |
Important |
qt5-qtwebengine |
否 |
完成修复 |
2024-11-25 |
2026-01-04 |
| CVE-2023-52424 |
The IEEE 802.11 standard sometimes enables an adversary to trick a victim into connecting to an unintended or untrusted network with Home WEP, Home WPA3 SAE-loop. Enterprise 802.1X/EAP, Mesh AMPE, or FILS, aka an "SSID Confusion" issue. This occurs because the SSID is not always used to derive the pairwise master key or session keys, and because there is not a protected exchange of an SSID during a 4-way handshake. |
Important |
wpa_supplicant, hostapd, linux-firmware, NetworkManager |
否 |
完成修复 |
2024-11-25 |
2026-01-08 |
| CVE-2023-51798 |
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via a floating point exception (FPE) error at libavfilter/vf_minterpolate.c:1078:60 in interpolate. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2023-51795 |
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavfilter/avf_showspectrum.c:1789:52 component in showspectrumpic_request_frame |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2023-51794 |
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavfilter/af_stereowiden.c:120:69. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2023-51793 |
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavutil/imgutils.c:353:9 in image_copy_plane. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2023-51791 |
Buffer Overflow vulenrability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via the libavcodec/jpegxl_parser.c in gen_alias_map. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2023-51596 |
BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.\n\nThe specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20939. |
Important |
bluez |
否 |
完成修复 |
2024-11-25 |
2026-01-05 |
| CVE-2023-50981 |
ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853. |
Important |
cryptopp |
是 |
完成修复 |
2024-11-25 |
2025-12-29 |
| CVE-2023-50700 |
Insecure Permissions vulnerability in Deepin dde-file-manager 6.0.54 and earlier allows privileged operations to be called by unprivileged users via the D-Bus method. |
Important |
dde-file-manager |
否 |
完成修复 |
2024-11-25 |
2026-01-06 |
| CVE-2023-50386 |
Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1.\n\nIn the affected versions, Solr ConfigSets accepted Java jar and class files to be uploaded through the ConfigSets API.\nWhen backing up Solr Collections, these configSet files would be saved to disk when using the LocalFileSystemRepository (the default for backups).\nIf the backup was saved to a directory that Solr uses in its ClassPath/ClassLoaders, then the jar and class files would be available to use with any ConfigSet, trusted or untrusted.\n\nWhen Solr is run in a secure way (Authorization enabled), as is strongly suggested, this vulnerability is limited to extending the Backup permissions with the ability to add libraries.\nUsers are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue.\nIn these versions, the following protections have been added:\n\n * Users are no longer able to upload files to a configSet that could be executed via a Java ClassLoader.\n * The Backup API restricts saving backups to directories that are used in the ClassLoader. |
Important |
lucene |
否 |
完成修复 |
2024-11-25 |
2026-01-05 |
| CVE-2023-50298 |
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1.\n\nSolr Streaming Expressions allows users to extract data from other Solr Clouds, using a "zkHost" parameter.\nWhen original SolrCloud is setup to use ZooKeeper credentials and ACLs, they will be sent to whatever "zkHost" the user provides.\nAn attacker could setup a server to mock ZooKeeper, that accepts ZooKeeper requests with credentials and ACLs and extracts the sensitive information,\nthen send a streaming expression using the mock server's address in "zkHost".\nStreaming Expressions are exposed via the "/streaming" handler, with "read" permissions.\n\nUsers are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue.\nFrom these versions on, only zkHost values that have the same server address (regardless of chroot), will use the given ZooKeeper credentials and ACLs when connecting. |
Important |
lucene |
否 |
完成修复 |
2024-11-25 |
2026-01-05 |
| CVE-2023-50292 |
Incorrect Permission Assignment for Critical Resource, Improper Control of Dynamically-Managed Code Resources vulnerability in Apache Solr.\n\nThis issue affects Apache Solr: from 8.10.0 through 8.11.2, from 9.0.0 before 9.3.0.\n\nThe Schema Designer was introduced to allow users to more easily configure and test new Schemas and configSets.\nHowever, when the feature was created, the "trust" (authentication) of these configSets was not considered.\nExternal library loading is only available to configSets that are "trusted" (created by authenticated users), thus non-authenticated users are unable to perform Remote Code Execution.\nSince the Schema Designer loaded configSets without taking their "trust" into account, configSets that were created by unauthenticated users were allowed to load external libraries when used in the Schema Designer.\n\nUsers are recommended to upgrade to version 9.3.0, which fixes the issue. |
Important |
lucene |
否 |
完成修复 |
2024-11-25 |
2026-01-05 |
| CVE-2023-50255 |
Deepin-Compressor is the default archive manager of Deepin Linux OS. Prior to 5.12.21, there's a path traversal vulnerability in deepin-compressor that can be exploited to achieve Remote Command Execution on the target system upon opening crafted archives. Users are advised to update to version 5.12.21 which addresses the issue. There are no known workarounds for this vulnerability. |
Important |
deepin-compressor |
否 |
完成修复 |
2024-11-25 |
2026-01-08 |
| CVE-2023-50010 |
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the set_encoder_id function in /fftools/ffmpeg_enc.c component. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-25 |
2025-12-06 |
| CVE-2023-31722 |
There exists a heap buffer overflow in nasm 2.16.02rc1 (GitHub commit: b952891). |
Important |
nasm |
否 |
完成修复 |
2024-11-25 |
2026-01-06 |
| CVE-2024-7272 |
A vulnerability, which was classified as critical, was found in FFmpeg up to 5.1.5. This affects the function fill_audiodata of the file /libswresample/swresample.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. This issue was fixed in version 6.0 by 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 but a backport for 5.1 was forgotten. The exploit has been disclosed to the public and may be used. Upgrading to version 5.1.6 and 6.0 9903ba28c28ab18dc7b7b6fb8571cc8b5caae1a6 is able to address this issue. It is recommended to upgrade the affected component. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-24 |
2025-12-06 |
| CVE-2024-6119 |
Issue summary: Applications performing certificate name checks (e.g., TLS\nclients checking server certificates) may attempt to read an invalid memory\naddress resulting in abnormal termination of the application process.\n\nImpact summary: Abnormal termination of an application can a cause a denial of\nservice.\n\nApplications performing certificate name checks (e.g., TLS clients checking\nserver certificates) may attempt to read an invalid memory address when\ncomparing the expected name with an `otherName` subject alternative name of an\nX.509 certificate. This may result in an exception that terminates the\napplication program.\n\nNote that basic certificate chain validation (signatures, dates, ...) is not\naffected, the denial of service can occur only when the application also\nspecifies an expected DNS name, Email address or IP address.\n\nTLS servers rarely solicit client certificates, and even when they do, they\ngenerally don't perform a name check against a reference identifier (expected\nidentity), but rather extract the presented identity after checking the\ncertificate chain. So TLS servers are generally not affected and the severity\nof the issue is Moderate.\n\nThe FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. |
Important |
mingw-openssl, openssl |
否 |
完成修复 |
2024-11-24 |
2025-12-30 |
| CVE-2024-5187 |
A vulnerability in the `download_model_with_test_data` function of the onnx/onnx framework, version 1.16.0, allows for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability enables attackers to overwrite any file on the system, potentially leading to remote code execution, deletion of system, personal, or application files, thus impacting the integrity and availability of the system. The issue arises from the function's handling of tar file extraction without performing security checks on the paths within the tar file, as demonstrated by the ability to overwrite the `/home/kali/.ssh/authorized_keys` file by specifying an absolute path in the malicious tar file. |
Important |
onnx |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2024-47910 |
An issue was discovered in SonarSource SonarQube before 9.9.5 LTA and 10.x before 10.5. A SonarQube user with the Administrator role can modify an existing configuration of a GitHub integration to exfiltrate a pre-signed JWT. |
Important |
sonarqube |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2024-46956 |
An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code execution. |
Moderate |
ghostscript |
否 |
完成修复 |
2024-11-24 |
2026-01-25 |
| CVE-2024-46954 |
An issue was discovered in decode_utf8 in base/gp_utf8.c in Artifex Ghostscript before 10.04.0. Overlong UTF-8 encoding leads to possible ../ directory traversal. |
Moderate |
ghostscript |
否 |
完成修复 |
2024-11-24 |
2026-01-25 |
| CVE-2024-46953 |
An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution. |
Moderate |
ghostscript |
否 |
完成修复 |
2024-11-24 |
2026-01-25 |
| CVE-2024-46952 |
An issue was discovered in pdf/pdf_xref.c in Artifex Ghostscript before 10.04.0. There is a buffer overflow during handling of a PDF XRef stream (related to W array values). |
Moderate |
ghostscript |
否 |
完成修复 |
2024-11-24 |
2026-01-25 |
| CVE-2024-46951 |
An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. An unchecked Implementation pointer in Pattern color space could lead to arbitrary code execution. |
Moderate |
ghostscript |
否 |
完成修复 |
2024-11-24 |
2026-01-25 |
| CVE-2024-4558 |
Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2024-45506 |
HAProxy 2.9.x before 2.9.10, 3.0.x before 3.0.4, and 3.1.x through 3.1-dev6 allows a remote denial of service. |
Important |
haproxy |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2024-4453 |
GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the parsing of EXIF metadata. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.\n. Was ZDI-CAN-23896. |
Important |
gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-base |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2024-43495 |
Windows libarchive Remote Code Execution Vulnerability |
Important |
libarchive |
否 |
完成修复 |
2024-11-24 |
2026-01-08 |
| CVE-2024-42415 |
An integer overflow vulnerability exists in the Compound Document Binary File format parser of v1.14.52 of the GNOME Project G Structured File Library (libgsf). A specially crafted file can result in an integer overflow that allows for a heap-based buffer overflow when processing the sector allocation table. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
Important |
libgsf |
否 |
完成修复 |
2024-11-24 |
2026-01-06 |
| CVE-2024-42005 |
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values() and values_list() methods on models with a JSONField are subject to SQL injection in column aliases via a crafted JSON object key as a passed *arg. |
Important |
python-django |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2024-41991 |
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and urlizetrunc template filters, and the AdminURLFieldWidget widget, are subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. |
Important |
python-django |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2024-41990 |
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters. |
Important |
python-django |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |