CVE-2025-22604 |
Description: Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.
CVSS: CRITICAL (9.1) EPSS Score: 0.04%
January 28th, 2025 (5 months ago)
|
CVE-2025-22513 |
Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Simple Locator allows Reflected XSS. This issue affects Simple Locator: from n/a through 2.0.4.
CVSS: HIGH (7.1) EPSS Score: 0.04%
January 28th, 2025 (5 months ago)
|
CVE-2025-21600 |
Description: An Out-of-Bounds Read vulnerability in
the routing protocol daemon (rpd) of
Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
This issue only affects systems configured in
either of two ways:
* systems with BGP traceoptions enabled
* systems with BGP family traffic-engineering (BGP-LS)
configured
and can be exploited from a directly connected and configured BGP peer.
This issue affects iBGP and eBGP
with
any address family
configured, and both IPv4 and IPv6 are affected by this vulnerability.
This issue affects:
Junos OS:
*
from 21.4 before 21.4R3-S9,
* from 22.2 before 22.2R3-S5,
* from 22.3 before 22.3R3-S4,
* from 22.4 before 22.4R3-S5,
* from 23.2 before 23.2R2-S3,
* from 23.4 before 23.4R2-S3,
* from 24.2 before 24.2R1-S2, 24.2R2;
Junos OS Evolved:
* from 21.4-EVO before 21.4R3-S9-EVO,
* from 22.2-EVO before 22.2R3-S5-EVO,
* from 22.3-EVO before 22.3R3-S4-EVO,
* from 22.4-EVO before 22.4R3-S5-EVO,
* from 23.2-EVO before 23.2R2-S3-EVO,
* from 23.4-EVO before 23.4R2-S2-EVO,
* from 24.2-...
CVSS: MEDIUM (6.5) EPSS Score: 0.04%
January 28th, 2025 (5 months ago)
|
CVE-2025-21417 |
Description: Windows Telephony Service Remote Code Execution Vulnerability
CVSS: HIGH (8.8) EPSS Score: 0.11%
January 28th, 2025 (5 months ago)
|
CVE-2025-21413 |
Description: Windows Telephony Service Remote Code Execution Vulnerability
CVSS: HIGH (8.8) EPSS Score: 0.11%
January 28th, 2025 (5 months ago)
|
CVE-2025-21411 |
Description: Windows Telephony Service Remote Code Execution Vulnerability
CVSS: HIGH (8.8) EPSS Score: 0.11%
January 28th, 2025 (5 months ago)
|
CVE-2025-21409 |
Description: Windows Telephony Service Remote Code Execution Vulnerability
CVSS: HIGH (8.8) EPSS Score: 0.11%
January 28th, 2025 (5 months ago)
|
CVE-2025-21405 |
Description: Visual Studio Elevation of Privilege Vulnerability
CVSS: HIGH (7.3) EPSS Score: 0.05%
January 28th, 2025 (5 months ago)
|
CVE-2025-21403 |
Description: On-Premises Data Gateway Information Disclosure Vulnerability
CVSS: MEDIUM (6.4) EPSS Score: 0.04%
January 28th, 2025 (5 months ago)
|
CVE-2025-21402 |
Description: Microsoft Office OneNote Remote Code Execution Vulnerability
CVSS: HIGH (7.8) EPSS Score: 0.05%
January 28th, 2025 (5 months ago)
|