52886 results (0.010 seconds)

CVSS: 10.0EPSS: %CPEs: 1EXPL: 0

07 Nov 2025 — Dosage is a comic strip downloader and archiver. When downloading comic images in versions 3.1 and below, Dosage constructs target file names from different aspects of the remote comic (page URL, image URL, page content, etc.). While the basename is properly stripped of directory-traversing characters, the file extension is taken from the HTTP Content-Type header. This allows a remote attacker (or a Man-in-the-Middle, if the comic is served over HTTP) to write arbitrary files outside the target directory (i... • https://github.com/webcomics/dosage/commit/336a9684191604bc49eed7296b74bd582151181e • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: %CPEs: 1EXPL: 0

06 Nov 2025 — Due to insufficient sanitization, an attacker can upload a specially crafted configuration file to cause a denial-of-service condition, traverse directories, or read/write files, within the context of the local system account. • https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-310-01.json • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.3EPSS: 0%CPEs: 83EXPL: 0

06 Nov 2025 — Improper Validation of Specified Quantity in Input vulnerability in TCP Communication Function on Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote attacker to disconnect the connection by sending specially crafted TCP packets to cause a denial-of-service (DoS) condition on the products. • https://jvn.jp/vu/JVNVU92088475 • CWE-1284: Improper Validation of Specified Quantity in Input •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

06 Nov 2025 — Remote Denial of Service can occur because of incorrect deserialization that results in failed memory allocation and a NULL pointer dereference. • https://anydesk.com/en/changelog/windows •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

06 Nov 2025 — An issue in KiloView Dual Channel 4k HDMI & 3G-SDI HEVC Video Encoder Firmware v.1.20.0006 allows a remote attacker to cause a denial of service via the systemctrl API System/reFactory component. • http://kiloview.com •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

05 Nov 2025 — Youki is a container runtime written in Rust. In versions 0.5.6 and below, youki’s apparmor handling performs insufficiently strict write-target validation, and when combined with path substitution during pathname resolution, can allow writes to unintended procfs locations. While resolving a path component-by-component, a shared-mount race can substitute intermediate components and redirect the final target. This issue is fixed in version 0.5.7. • https://github.com/youki-dev/youki/commit/5886c91073b9be748bd8d5aed49c4a820548030a • CWE-61: UNIX Symbolic Link (Symlink) Following CWE-363: Race Condition Enabling Link Following •

CVSS: 7.7EPSS: 0%CPEs: 28EXPL: 0

05 Nov 2025 — A successful attack could enable a remote, unauthenticated attacker to read sensitive files from the server's filesystem or perform denial-of-service (DoS) attacks that render affected services unavailable. • https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4505 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 6.7EPSS: 0%CPEs: 1EXPL: 0

05 Nov 2025 — A high privileged attacker could potentially exploit this vulnerability leading to Denial of service. • https://www.dell.com/support/kbdoc/en-us/000384363/dsa-2025-374-security-update-for-dell-cloudlink-multiple-security-vulnerabilities • CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

05 Nov 2025 — A successful exploit could allow the attacker to cause a denial of service (DoS) condition when Cisco ISE restarts. • https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radsupress-dos-8YF3JThh • CWE-697: Incorrect Comparison •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

05 Nov 2025 — As a consequence, `django.http.HttpResponseRedirect`, `django.http.HttpResponsePermanentRedirect`, and the shortcut `django.shortcuts.redirect` were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. As a consequence, `django.http.HttpResponseRedirect`, `django.http.HttpResponsePermanentRedirect`, and the shortcut `django.shortcuts.redirect` were subject to a potential denial-of-service attack via certain inputs with a very large ... • https://docs.djangoproject.com/en/dev/releases/security • CWE-407: Inefficient Algorithmic Complexity •