![]() |
Description: Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
https://nvd.nist.gov/vuln/detail/CVE-2025-2783
https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html
https://issues.chromium.org/issues/405143032
References
https://github.com/cefsharp/CefSharp/security/advisories/GHSA-f87w-3j5w-v58p
https://nvd.nist.gov/vuln/detail/CVE-2025-2783
https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html
https://github.com/cefsharp/CefSharp/releases/tag/v134.3.90
https://issues.chromium.org/issues/405143032
https://github.com/advisories/GHSA-f87w-3j5w-v58p
CVSS: HIGH (8.3) EPSS Score: 2.01%
April 12th, 2025 (3 months ago)
|
CVE-2025-29834 |
Description: Out-of-bounds read in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.
CVSS: HIGH (7.5) EPSS Score: 0.06%
April 12th, 2025 (3 months ago)
|
CVE-2025-29803 |
Description: Uncontrolled search path element in Visual Studio Tools for Applications and SQL Server Management Studio allows an authorized attacker to elevate privileges locally.
CVSS: HIGH (7.3) EPSS Score: 0.06%
April 12th, 2025 (3 months ago)
|
CVE-2024-0397 |
Description: A defect was discovered in the Python “ssl” module where there is a memory
race condition with the ssl.SSLContext methods “cert_store_stats()” and
“get_ca_certs()”. The race condition can be triggered if the methods are
called at the same time as certificates are loaded into the SSLContext,
such as during the TLS handshake with a certificate directory configured.
This issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.
CVSS: HIGH (7.4) EPSS Score: 0.39% SSVC Exploitation: none
April 11th, 2025 (3 months ago)
|
CVE-2025-32367 |
Description: The Oz Forensics face recognition application before 4.0.8 late 2023 allows PII retrieval via /statistic/list Insecure Direct Object Reference. NOTE: the number 4.0.8 was used for both the unpatched and patched versions.
CVSS: HIGH (8.6) EPSS Score: 0.04%
April 11th, 2025 (3 months ago)
|
CVE-2024-13861 |
Description: A code injection vulnerability in the Debian package component of Taegis Endpoint Agent (Linux) versions older than 1.3.10 allows local users arbitrary code execution as root. Redhat-based systems using RPM packages are not affected.
CVSS: HIGH (7.8) EPSS Score: 0.01%
April 11th, 2025 (3 months ago)
|
CVE-2024-52280 |
Description: A Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SUSE rancher which allows users to watch resources they are not allowed to access, when they have at least some generic permissions on the type.
This issue affects rancher: before 2175e09, before 6e30359, before c744f0b.
CVSS: HIGH (7.7) EPSS Score: 0.02%
April 11th, 2025 (3 months ago)
|
CVE-2025-23389 |
Description: A Improper Access Control vulnerability in SUSE rancher allows a local user to impersonate other identities through SAML Authentication on first login.
This issue affects rancher: from 2.8.0 before 2.8.13, from 2.9.0 before 2.9.7, from 2.10.0 before 2.10.3.
CVSS: HIGH (8.4) EPSS Score: 0.07%
April 11th, 2025 (3 months ago)
|
CVE-2025-23388 |
Description: A Stack-based Buffer Overflow vulnerability in SUSE rancher allows for denial of service.This issue affects rancher: from 2.8.0 before 2.8.13, from 2.9.0 before 2.9.7, from 2.10.0 before 2.10.3.
CVSS: HIGH (8.2) EPSS Score: 0.05%
April 11th, 2025 (3 months ago)
|
CVE-2025-31932 |
Description: Deserialization of untrusted data issue exists in BizRobo! all versions. If this vulnerability is exploited, an arbitrary code is executed on the Management Console.
The vendor provides the workaround information and recommends to apply it to the deployment environment.
CVSS: HIGH (8.8) EPSS Score: 0.06%
April 11th, 2025 (3 months ago)
|