| CVE-2024-41989 |
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat template filter is subject to significant memory consumption when given a string representation of a number in scientific notation with a large exponent. |
Important |
python-django |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2024-41817 |
ImageMagick is a free and open-source software suite, used for editing and manipulating digital images. The `AppImage` version `ImageMagick` might use an empty path when setting `MAGICK_CONFIGURE_PATH` and `LD_LIBRARY_PATH` environment variables while executing, which might lead to arbitrary code execution by loading malicious configuration files or shared libraries in the current working directory while executing `ImageMagick`. The vulnerability is fixed in 7.11-36. |
Important |
ImageMagick |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2024-41671 |
Twisted is an event-based framework for internet applications, supporting Python 3.6+. The HTTP 1.0 and 1.1 server provided by twisted.web could process pipelined HTTP requests out-of-order, possibly resulting in information disclosure. This vulnerability is fixed in 24.7.0rc1. |
Important |
python-twisted |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2024-41110 |
Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.\n\nUsing a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.\n\nA security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.\n\nDocker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.\n\ndocker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege. |
Critical |
container-tools:4.0, container-tools:2.0, podman, container-tools:3.0, moby, container-tools:an8, docker, container-tools:1.0 |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2024-40898 |
SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. |
Important |
httpd |
否 |
完成修复 |
2024-11-24 |
2026-01-09 |
| CVE-2024-39614 |
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters. |
Important |
python-django |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2024-36474 |
An integer overflow vulnerability exists in the Compound Document Binary File format parser of the GNOME Project G Structured File Library (libgsf) version v1.14.52. A specially crafted file can result in an integer overflow when processing the directory from the file that allows for an out-of-bounds index to be used when reading and writing to an array. This can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
Important |
libgsf |
否 |
完成修复 |
2024-11-24 |
2026-01-06 |
| CVE-2024-34509 |
dcmdata in DCMTK before 3.6.9 has a segmentation fault via an invalid DIMSE message. |
Important |
dcmtk |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2024-34402 |
An issue was discovered in uriparser through 0.9.7. ComposeQueryEngine in UriQuery.c has an integer overflow via long keys or values, with a resultant buffer overflow. |
Important |
uriparser |
是 |
完成修复 |
2024-11-24 |
2025-12-30 |
| CVE-2024-33877 |
HDF5 Library through 1.14.3 has a heap-based buffer overflow in H5T__conv_struct_opt in H5Tconv.c. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2024-33876 |
HDF5 Library through 1.14.3 has a heap buffer overflow in H5S__point_deserialize in H5Spoint.c. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2024-26817 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-24 |
2026-01-21 |
| CVE-2023-50009 |
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_gaussian_blur_8 function in libavfilter/edge_template.c:116:5 component. |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-24 |
2025-12-06 |
| CVE-2023-50008 |
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the av_malloc function in libavutil/mem.c:105:9 component. |
Important |
ffmpeg |
是 |
完成修复 |
2024-11-24 |
2025-12-06 |
| CVE-2023-49528 |
Buffer Overflow vulnerability in FFmpeg version n6.1-3-g466799d4f5, allows a local attacker to execute arbitrary code and cause a denial of service (DoS) via the af_dialoguenhance.c:261:5 in the de_stereo component. |
Important |
ffmpeg |
是 |
完成修复 |
2024-11-24 |
2025-12-06 |
| CVE-2023-49502 |
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_bwdif_filter_intra_c function in the libavfilter/bwdifdsp.c:125:5 component. |
Important |
ffmpeg |
是 |
完成修复 |
2024-11-24 |
2025-12-06 |
| CVE-2023-49501 |
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the config_eq_output function in the libavfilter/asrc_afirsrc.c:495:30 component. |
Important |
ffmpeg |
是 |
完成修复 |
2024-11-24 |
2025-12-06 |
| CVE-2023-47994 |
An integer overflow vulnerability in LoadPixelDataRLE4 function in PluginBMP.cpp in Freeimage 3.18.0 allows attackers to obtain sensitive information, cause a denial of service and/or run arbitrary code. |
Important |
freeimage |
否 |
完成修复 |
2024-11-24 |
2026-01-08 |
| CVE-2023-47992 |
An integer overflow vulnerability in FreeImageIO.cpp::_MemoryReadProc in FreeImage 3.18.0 allows attackers to obtain sensitive information, cause a denial-of-service attacks and/or run arbitrary code. |
Important |
freeimage |
否 |
完成修复 |
2024-11-24 |
2026-01-07 |
| CVE-2023-4785 |
Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. |
Important |
grpc |
是 |
完成修复 |
2024-11-24 |
2026-01-17 |
| CVE-2023-47470 |
Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a denial of service (DoS) via the ref_pic_list_struct function in libavcodec/evc_ps.c |
Important |
ffmpeg |
否 |
完成修复 |
2024-11-24 |
2025-12-06 |
| CVE-2023-46427 |
An issue was discovered in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via null pointer deference in gf_dash_setup_period component in media_tools/dash_client.c. |
Critical |
gpac |
否 |
完成修复 |
2024-11-24 |
2026-01-10 |
| CVE-2023-46426 |
Heap-based Buffer Overflow vulnerability in gpac version 2.3-DEV-rev588-g7edc40fee-master, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) via gf_fwrite component in at utils/os_file.c. |
Important |
gpac |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-46047 |
An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file. |
Important |
sane-backends |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-45922 |
glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation violation when calling __glXGetDrawableAttribute(). NOTE: this is disputed because there are no common situations in which users require uninterrupted operation with an attacker-controller server. |
Important |
mesa |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2023-41038 |
Firebird is a relational database. Versions 4.0.0 through 4.0.3 and version 5.0 beta1 are vulnerable to a server crash when a user uses a specific form of SET BIND statement. Any non-privileged user with minimum access to a server may type a statement with a long `CHAR` length, which causes the server to crash due to stack corruption. Versions 4.0.4.2981 and 5.0.0.117 contain fixes for this issue. No known workarounds are available. |
Important |
firebird |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2023-40481 |
7-Zip SquashFS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SQFS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18589. |
Important |
p7zip |
否 |
完成修复 |
2024-11-24 |
2025-12-30 |
| CVE-2023-39018 |
FFmpeg 0.7.0 and below was discovered to contain a code injection vulnerability in the component net.bramp.ffmpeg.FFmpeg.. This vulnerability is exploited via passing an unchecked argument. NOTE: this is disputed by multiple third parties because there are no realistic use cases in which FFmpeg.java uses untrusted input for the path of the executable file. |
Critical |
ffmpeg |
否 |
完成修复 |
2024-11-24 |
2025-12-06 |
| CVE-2023-33953 |
gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks:\n\n- Unbounded memory buffering in the HPACK parser\n- Unbounded CPU consumption in the HPACK parser\n\nThe unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client.\n\nThe unbounded memory buffering bugs:\n\n- The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb.\n- HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse.\n- gRPC’s metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc… |
Important |
grpc |
是 |
完成修复 |
2024-11-24 |
2026-01-17 |
| CVE-2023-32731 |
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005 |
Important |
grpc |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-32216 |
Memory safety bugs present in Firefox 112. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 113. |
Critical |
firefox |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-32209 |
A maliciously crafted favicon could have led to an out of memory crash. This vulnerability affects Firefox < 113. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2023-3217 |
Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
Important |
qt5-qtwebengine |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-3216 |
Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
Important |
qt5-qtwebengine |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-3215 |
Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
Important |
qt5-qtwebengine |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-31724 |
yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function do_directive at /nasm/nasm-pp.c. |
Important |
yasm |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-31102 |
Ppmd7.c in 7-Zip before 23.00 allows an integer underflow and invalid read operation via a crafted 7Z archive. |
Important |
p7zip |
否 |
完成修复 |
2024-11-24 |
2025-12-30 |
| CVE-2023-30513 |
Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. |
Important |
kubernetes |
否 |
完成修复 |
2024-11-24 |
2026-01-06 |
| CVE-2023-29551 |
Mozilla developers Randell Jesup, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 111. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2023-29543 |
An attacker could have caused memory corruption and a potentially exploitable use-after-free of a pointer in a global object's debugger vector. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2023-29537 |
Multiple race conditions in the font initialization could have led to memory corruption and execution of attacker-controlled code. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2023-29534 |
Different techniques existed to obscure the fullscreen notification in Firefox and Focus for Android. These could have led to potential user confusion and spoofing attacks.\n\n*This bug only affects Firefox and Focus for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox for Android < 112 and Focus for Android < 112. |
Critical |
firefox |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-28161 |
If temporary "one-time" permissions, such as the ability to use the Camera, were granted to a document loaded using a file: URL, that permission persisted in that tab for all other documents loaded from a file: URL. This is potentially dangerous if the local files came from different sources, such as in a download directory. This vulnerability affects Firefox < 111. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2023-2618 |
A vulnerability, which was classified as problematic, has been found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is the function DecodedBitStreamParser::decodeHanziSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to memory leak. The attack may be launched remotely. The name of the patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-228548. |
Important |
opencv |
否 |
完成修复 |
2024-11-24 |
2025-12-06 |
| CVE-2023-2617 |
A vulnerability classified as problematic was found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this vulnerability is the function DecodedBitStreamParser::decodeByteSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-228547. |
Important |
opencv |
否 |
完成修复 |
2024-11-24 |
2025-12-06 |
| CVE-2023-25674 |
TensorFlow is an open source machine learning platform. Versions prior to 2.12.0 and 2.11.1 have a null pointer error in RandomShuffle with XLA enabled. A fix is included in TensorFlow 2.12.0 and 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-25671 |
TensorFlow is an open source platform for machine learning. There is out-of-bounds access due to mismatched integer type sizes. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-25666 |
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a floating point exception in AudioSpectrogram. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-25665 |
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `SparseSparseMaximum` is given invalid sparse tensors as inputs, it can give a null pointer error. A fix is included in TensorFlow version 2.12 and version 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-25662 |
TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 are vulnerable to integer overflow in EditDistance. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. |
Important |
tensorflow |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-24824 |
cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `>` or `-` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. Users unable to upgrade should validate that their input comes from trusted sources. |
Important |
pandoc, python-cmarkgfm |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2023-24816 |
IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Versions prior to 8.1.0 are subject to a command injection vulnerability with very specific prerequisites. This vulnerability requires that the function `IPython.utils.terminal.set_term_title` be called on Windows in a Python environment where ctypes is not available. The dependency on `ctypes` in `IPython.utils._process_win32` prevents the vulnerable code from ever being reached in the ipython binary. However, as a library that could be used by another tool `set_term_title` could be called and hence introduce a vulnerability. Should an attacker get untrusted input to an instance of this function they would be able to inject shell commands as current process and limited to the scope of the current process. Users of ipython as a library are advised to upgrade. Users unable to upgrade should ensure that any calls to the `IPython.utils.terminal.set_term_title` function are done with trusted or filtered input. |
Important |
ipython |
否 |
完成修复 |
2024-11-24 |
2026-01-06 |
| CVE-2023-24580 |
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack. |
Important |
python-django |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-23969 |
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large. |
Important |
python-django |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-22551 |
The FTP (aka "Implementation of a simple FTP client and server") project through 96c1a35 allows remote attackers to cause a denial of service (memory consumption) by engaging in client activity, such as establishing and then terminating a connection. This occurs because malloc is used but free is not. |
Important |
ftp |
否 |
完成修复 |
2024-11-24 |
2026-01-07 |
| CVE-2023-22486 |
cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 contain a polynomial time complexity issue in handle_close_bracket that may lead to unbounded resource exhaustion and subsequent denial of service. This vulnerability has been patched in 0.29.0.gfm.7. |
Important |
python-cmarkgfm |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-22484 |
cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 are subject to a polynomial time complexity issue in cmark-gfm that may lead to unbounded resource exhaustion and subsequent denial of service. This vulnerability has been patched in 0.29.0.gfm.7. |
Important |
python-cmarkgfm |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2023-22483 |
cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. Versions prior to 0.29.0.gfm.7 are subject to several polynomial time complexity issues in cmark-gfm that may lead to unbounded resource exhaustion and subsequent denial of service. Various commands, when piped to cmark-gfm with large values, cause the running time to increase quadratically. These vulnerabilities have been patched in version 0.29.0.gfm.7. |
Important |
python-cmarkgfm |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-47630 |
Trusted Firmware-A through 2.8 has an out-of-bounds read in the X.509 parser for parsing boot certificates. This affects downstream use of get_ext and auth_nvctr. Attackers might be able to trigger dangerous read side effects or obtain sensitive information about microarchitectural state. |
Important |
arm-trusted-firmware |
否 |
完成修复 |
2024-11-24 |
2026-01-06 |
| CVE-2022-46885 |
Mozilla developers Timothy Nikkel, Ashley Hale, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 105. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 106. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-46879 |
Mozilla developers and community members Lukas Bernhard, Gabriele Svelto, Randell Jesup, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 107. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-46873 |
Because Firefox did not implement the unsafe-hashes CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-45415 |
When downloading an HTML file, if the title of the page was formatted as a filename with a malicious extension, Firefox may have saved the file with that extension, leading to possible system compromise if the downloaded file was later ran. This vulnerability affects Firefox < 107. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-45407 |
If an attacker loaded a font using FontFace() on a background worker, a use-after-free could have occurred, leading to a potentially exploitable crash. This vulnerability affects Firefox < 107. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-44940 |
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPath at src/patchelf.cc. |
Critical |
patchelf |
否 |
完成修复 |
2024-11-24 |
2026-01-09 |
| CVE-2022-42930 |
If two Workers were simultaneously initializing their CacheStorage, a data race could have occurred in the `ThirdPartyUtil` component. This vulnerability affects Firefox < 106. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-40320 |
cfg_tilde_expand in confuse.c in libConfuse 3.3 has a heap-based buffer over-read. |
Important |
libconfuse |
否 |
完成修复 |
2024-11-24 |
2026-01-08 |
| CVE-2022-39286 |
Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds. |
Important |
python-jupyter-core |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-38928 |
XPDF 4.04 is vulnerable to Null Pointer Dereference in FoFiType1C.cc:2393. |
Important |
xpdf |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-38238 |
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::lookChar() at /xpdf/Stream.cc. |
Important |
xpdf |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-38237 |
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::readScan() at /xpdf/Stream.cc. |
Important |
xpdf |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-38236 |
XPDF commit ffaf11c was discovered to contain a global-buffer overflow via Lexer::getObj(Object*) at /xpdf/Lexer.cc. |
Important |
xpdf |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-38231 |
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::getChar() at /xpdf/Stream.cc. |
Important |
xpdf |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-38229 |
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::readHuffSym(DCTHuffTable*) at /xpdf/Stream.cc. |
Important |
xpdf |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-38228 |
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::transformDataUnit at /xpdf/Stream.cc. |
Important |
xpdf |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-38227 |
XPDF commit ffaf11c was discovered to contain a stack overflow via __asan_memcpy at asan_interceptors_memintrinsics.cpp. |
Important |
xpdf |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-38222 |
There is a use-after-free issue in JBIG2Stream::close() located in JBIG2Stream.cc in Xpdf 4.04. It can be triggered by sending a crafted PDF file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service or possibly have unspecified other impact. |
Important |
xpdf |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-35414 |
softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash. NOTE: a third party states that the Non-virtualization Use Case in the qemu.org reference applies here, i.e., "Bugs affecting the non-virtualization use case are not considered security bugs at this time. |
Important |
qemu, qemu-kvm:a8 |
否 |
完成修复 |
2024-11-24 |
2025-12-08 |
| CVE-2022-32912 |
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code execution. |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-32547 |
In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior. |
Important |
ImageMagick |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2022-32546 |
A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. |
Important |
ImageMagick |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2022-32545 |
A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. |
Important |
ImageMagick |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2022-32200 |
libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_string_valid in dwarf_util.c. |
Important |
libdwarf |
否 |
完成修复 |
2024-11-24 |
2026-01-06 |
| CVE-2022-32166 |
In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. |
Important |
openvswitch |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2022-30790 |
Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2022-30552. |
Important |
uboot-tools |
否 |
完成修复 |
2024-11-24 |
2025-12-30 |
| CVE-2022-30065 |
A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function. |
Important |
busybox |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2022-29918 |
Mozilla developers Gabriele Svelto, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 100. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-29241 |
Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications like Jupyter Notebook. Prior to version 1.17.1, if notebook server is started with a value of `root_dir` that contains the starting user's home directory, then the underlying REST API can be used to leak the access token assigned at start time by guessing/brute forcing the PID of the jupyter server. While this requires an authenticated user session, this URL can be used from a cross-site scripting payload or from a hooked or otherwise compromised browser to leak this access token to a malicious third party. This token can be used along with the REST API to interact with Jupyter services/notebooks such as modifying or overwriting critical files, such as .bashrc or .ssh/authorized_keys, allowing a malicious user to read potentially sensitive data and possibly gain control of the impacted system. This issue is patched in version 1.17.1. |
Important |
python-jupyter-server |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-28391 |
BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors. |
Important |
busybox |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2022-28288 |
Mozilla developers and community members Randell Jesup, Sebastian Hengst, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 99. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-28284 |
SVG's <use> element could have been used to load unexpected content that could have executed script in certain circumstances. While the specification seems to allow this, other browsers do not, and web developers relied on this property for script security so gecko's implementation was aligned with theirs. This vulnerability affects Firefox < 99. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-26488 |
In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2. |
Important |
python3 |
否 |
完成修复 |
2024-11-24 |
2026-01-09 |
| CVE-2022-26061 |
A heap-based buffer overflow vulnerability exists in the gif2h5 functionality of HDF5 Group libhdf5 1.10.4. A specially-crafted GIF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2022-25972 |
An out-of-bounds write vulnerability exists in the gif2h5 functionality of HDF5 Group libhdf5 1.10.4. A specially-crafted GIF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2022-25942 |
An out-of-bounds read vulnerability exists in the gif2h5 functionality of HDF5 Group libhdf5 1.10.4. A specially-crafted GIF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. |
Important |
hdf5 |
否 |
完成修复 |
2024-11-24 |
2026-01-05 |
| CVE-2022-24106 |
In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing the 'interleaved' flag to be changed after the first scan of the image, leading to an unknown integer-related vulnerability in Stream.cc. |
Important |
poppler |
否 |
完成修复 |
2024-11-24 |
2026-01-04 |
| CVE-2022-2309 |
NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered. |
Important |
libxml2 |
否 |
完成修复 |
2024-11-24 |
2026-01-09 |
| CVE-2022-22758 |
When clicking on a tel: link, USSD codes, specified after a \\* character, would be included in the phone number. On certain phones, or on certain carriers, if the number was dialed this could perform actions on a user's account, similar to a cross-site request forgery attack. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |
| CVE-2022-22755 |
By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97. |
Important |
firefox |
否 |
完成修复 |
2024-11-24 |
2025-12-29 |