Page 27 of 38745 results (0.020 seconds)

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1 allows a remote Denial of Service because of memory corruption during scanning of a PE32 file. • https://withsecure.com https://www.withsecure.com/en/support/security-advisories/cve-2024-45520 • CWE-125: Out-of-bounds Read •

CVSS: 2.2EPSS: 0%CPEs: 1EXPL: 0

Signature checks are still present so real world impact is likely limited to denial of service scenarios. • https://github.com/jpadilla/pyjwt/commit/1570e708672aa9036bc772476beae8bfa48f4131#diff-6893ad4a1c5a36b8af3028db8c8bc3b62418149843fc382faf901eaab008e380R366 https://github.com/jpadilla/pyjwt/commit/33022c25525c1020869c71ce2a4109e44ae4ced1 https://github.com/jpadilla/pyjwt/security/advisories/GHSA-75c5-xw7c-p5pm • CWE-697: Incorrect Comparison •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) as the minimum consequence. • https://github.com/intlify/vue-i18n/commit/9f20909ef8c9232a1072d7818e12ed6d6451024d https://github.com/intlify/vue-i18n/security/advisories/GHSA-hjwq-mjwj-4x6c • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 5.3EPSS: 0%CPEs: -EXPL: 0

FFmpeg n6.1.1 has a vulnerability in the WAVARC decoder of the libavcodec library which allows for an integer overflow when handling certain block types, leading to a denial-of-service (DoS) condition. • https://gist.github.com/1047524396/fad68e8251f4e34a1bb838de697d5119 https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/wavarc.c#L651 https://github.com/ffmpeg/ffmpeg/commit/28c7094b25b689185155a6833caf2747b94774a4 • CWE-190: Integer Overflow or Wraparound •

CVSS: 5.5EPSS: 0%CPEs: -EXPL: 0

WithSecure Elements Agent for Mac before 24.3, MDR before 24.3, and Elements Client Security for Mac before 16.10 allow a remote Denial of Service. • https://www.withsecure.com/en/support/security-advisories/cve-2024-47193 •