Updated CVEs

IDDescriptionSeverity
CVE-2025-46305The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
medium
CVE-2025-46304The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
medium
CVE-2025-46303The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
medium
CVE-2025-46302The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
medium
CVE-2025-46301The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
medium
CVE-2025-46300The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.
medium
CVE-2025-46290A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. A remote attacker may be able to cause a denial-of-service.
high
CVE-2025-43537A path handling issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5. Restoring a maliciously crafted backup file may lead to modification of protected system files.
medium
CVE-2025-43417A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4. An app may be able to access user-sensitive data.
medium
CVE-2025-43403An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. An app may be able to access sensitive user data.
medium
CVE-2025-40905WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
critical
CVE-2025-40536SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality.
critical
CVE-2025-38575In the Linux kernel, the following vulnerability has been resolved: ksmbd: use aead_request_free to match aead_request_alloc Use aead_request_free() instead of kfree() to properly free memory allocated by aead_request_alloc(). This ensures sensitive crypto data is zeroed before being freed.
medium
CVE-2025-38501In the Linux kernel, the following vulnerability has been resolved: ksmbd: limit repeated connections from clients with the same IP Repeated connections from clients with the same IP address may exhaust the max connections and prevent other normal client connections. This patch limit repeated connections from clients with the same IP.
medium
CVE-2025-37947In the Linux kernel, the following vulnerability has been resolved: ksmbd: prevent out-of-bounds stream writes by validating *pos ksmbd_vfs_stream_write() did not validate whether the write offset (*pos) was within the bounds of the existing stream data length (v_len). If *pos was greater than or equal to v_len, this could lead to an out-of-bounds memory write. This patch adds a check to ensure *pos is less than v_len before proceeding. If the condition fails, -EINVAL is returned.
high
CVE-2025-37778In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix dangling pointer in krb_authenticate krb_authenticate frees sess->user and does not set the pointer to NULL. It calls ksmbd_krb5_authenticate to reinitialise sess->user but that function may return without doing so. If that happens then smb2_sess_setup, which calls krb_authenticate, will be accessing free'd memory when it later uses sess->user.
high
CVE-2025-37775In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix the warning from __kernel_write_iter [ 2110.972290] ------------[ cut here ]------------ [ 2110.972301] WARNING: CPU: 3 PID: 735 at fs/read_write.c:599 __kernel_write_iter+0x21b/0x280 This patch doesn't allow writing to directory.
medium
CVE-2025-37162A vulnerability in the command line interface of affected devices could allow an authenticated remote attacker to conduct a command injection attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.
high
CVE-2025-37161A vulnerability in the web-based management interface of affected products could allow an unauthenticated remote attacker to cause a denial of service. Successful exploitation could allow an attacker to crash the system, preventing it from rebooting without manual intervention and disrupting network operations.
high
CVE-2025-36552Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36545Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36542Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36538Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36534Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36532Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36526Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36524Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36523Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-36517Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35997Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35993Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35976Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35962Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35961Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-35960Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-34153Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.
critical
CVE-2025-33042Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Avro Java SDK when generating specific records from untrusted Avro schemas. This issue affects Apache Avro Java SDK: all versions through 1.11.4 and version 1.12.0. Users are recommended to upgrade to version 1.12.1 or 1.11.5, which fix the issue.
medium
CVE-2025-32734Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-32733Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-32709Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
high
CVE-2025-32090Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-32085Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-32082Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-32009Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-31942Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-31364Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-31358Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-31145Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-30517Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
No Score
CVE-2025-29972Server-side request forgery (ssrf) in Azure Storage Resource Provider allows an authorized attacker to perform spoofing over a network.
critical