CVSS: 4.5EPSS: 0%CPEs: 20EXPL: 0CVE-2025-4877 – Libssh: write beyond bounds in binary to base64 conversion functions
https://notcve.org/view.php?id=CVE-2025-4877
04 Jul 2025 — There's a vulnerability in the libssh package where when a libssh consumer passes in an unexpectedly large input buffer to ssh_get_fingerprint_hash() function. In such cases the bin_to_base64() function can experience an integer overflow leading to a memory under allocation, when that happens it's possible that the program perform out of bounds write leading to a heap corruption. This issue affects only 32-bits builds of libssh. Existe una vulnerabilidad en el paquete libssh: cuando un consumidor de libssh ... • https://access.redhat.com/security/cve/CVE-2025-4877 • CWE-787: Out-of-bounds Write •
CVSS: 8.8EPSS: 13%CPEs: 33EXPL: 11CVE-2025-32462 – Sudo 1.9.17 Host Option - Elevation of Privilege
https://notcve.org/view.php?id=CVE-2025-32462
30 Jun 2025 — Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines. A privilege escalation vulnerability was found in Sudo. In certain configurations, unauthorized users can gain elevated system privileges via the Sudo host option (`-h` or `--host`). When using the default sudo security policy plugin (sudoers), the host option is intended to be used in conjunction with the list option (`-l` or `--... • https://packetstorm.news/files/id/206211 • CWE-863: Incorrect Authorization •
CVSS: 8.5EPSS: 0%CPEs: 42EXPL: 0CVE-2025-5318 – Libssh: out-of-bounds read in sftp_handle()
https://notcve.org/view.php?id=CVE-2025-5318
24 Jun 2025 — A flaw was found in the libssh library. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior. A flaw was found in the libssh library in versions less than... • https://access.redhat.com/security/cve/CVE-2025-5318 • CWE-125: Out-of-bounds Read •
CVSS: 8.3EPSS: 0%CPEs: 23EXPL: 0CVE-2025-6032 – Podman: podman missing tls verification
https://notcve.org/view.php?id=CVE-2025-6032
24 Jun 2025 — A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack. Red Hat OpenShift Container Platform release 4.19.5 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a buffer overflow vulnerability. • https://access.redhat.com/security/cve/CVE-2025-6032 • CWE-295: Improper Certificate Validation •
CVSS: 10.0EPSS: 0%CPEs: 18EXPL: 0CVE-2025-6436 – Memory safety bugs fixed in Firefox 140 and Thunderbird 140
https://notcve.org/view.php?id=CVE-2025-6436
24 Jun 2025 — Memory safety bugs present in Firefox 139 and Thunderbird 139. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 140. Memory safety bugs present in Firefox 139 and Thunderbird 139. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. • https://bugzilla.mozilla.org/buglist.cgi?bug_id=1941377%2C1960948%2C1966187%2C1966505%2C1970764 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVSS: 8.1EPSS: 0%CPEs: 18EXPL: 0CVE-2025-6435 – Save as in Devtools could download files without sanitizing the extension
https://notcve.org/view.php?id=CVE-2025-6435
24 Jun 2025 — If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox < 140. If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently runnin... • https://bugzilla.mozilla.org/show_bug.cgi?id=1950056 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0CVE-2025-6434 – HTTPS-Only exception screen lacked anti-clickjacking delay
https://notcve.org/view.php?id=CVE-2025-6434
24 Jun 2025 — The exception page for the HTTPS-Only feature, displayed when a website is opened via HTTP, lacked an anti-clickjacking delay, potentially allowing an attacker to trick a user into granting an exception and loading a webpage over HTTP. This vulnerability affects Firefox < 140. The exception page for the HTTPS-Only feature, displayed when a website is opened via HTTP, lacked an anti-clickjacking delay, potentially allowing an attacker to trick a user into granting an exception and loading a webpage over HTTP... • https://bugzilla.mozilla.org/show_bug.cgi?id=1955182 • CWE-1021: Improper Restriction of Rendered UI Layers or Frames •
CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0CVE-2025-6433 – WebAuthn would allow a user to sign a challenge on a webpage with an invalid TLS certificate
https://notcve.org/view.php?id=CVE-2025-6433
24 Jun 2025 — If a user visited a webpage with an invalid TLS certificate, and granted an exception, the webpage was able to provide a WebAuthn challenge that the user would be prompted to complete. This is in violation of the WebAuthN spec which requires "a secure transport established without errors". This vulnerability affects Firefox < 140. If a user visited a webpage with an invalid TLS certificate, and granted an exception, the webpage was able to provide a WebAuthn challenge that the user would be prompted to comp... • https://bugzilla.mozilla.org/show_bug.cgi?id=1954033 • CWE-295: Improper Certificate Validation •
CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0CVE-2025-6432 – DNS Requests leaked outside of a configured SOCKS proxy
https://notcve.org/view.php?id=CVE-2025-6432
24 Jun 2025 — When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140. When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox < 140 and Thunderbird < 140. These are all security issues fixed in the MozillaThunderbird-140.1.0-1.1 package ... • https://bugzilla.mozilla.org/show_bug.cgi?id=1943804 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0CVE-2025-6431 – The prompt in Firefox for Android that asks before opening a link in an external application could be bypassed
https://notcve.org/view.php?id=CVE-2025-6431
24 Jun 2025 — When a link can be opened in an external application, Firefox for Android will, by default, prompt the user before doing so. An attacker could have bypassed this prompt, potentially exposing the user to security vulnerabilities or privacy leaks in external applications. *This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox < 140. These are all security issues fixed in the MozillaFirefox-140.0.2-1.1 package on the GA media of openSUSE Tumble... • https://bugzilla.mozilla.org/show_bug.cgi?id=1942716 • CWE-285: Improper Authorization •
