24h | 7d | 30d

Overview

  • cJSON Project
  • cJSON

19 Apr 2025
Published
03 Nov 2025
Updated

CVSS v3.1
LOW (2.9)
EPSS
0.04%

KEV

Description

cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as {"a": true, "b": [ null,9999999999999999999999999999999999999999999999912345678901234567]}.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 8 hours ago

Bluesky

Profile picture
๐Ÿ” URGENT SECURITY UPDATE for #Ubuntu users and #DevOps teams! Critical vulnerabilities (CVE-2023-26819, CVE-2023-53154, CVE-2025-57052) discovered in cJSONโ€”the lightweight JSON parser used across Ubuntu 20.04-25.10. Read more: ๐Ÿ‘‰ tinyurl.com/4w49jw9s #Security
  • 0
  • 1
  • 0
  • 8h ago

Overview

  • cJSON project
  • cJSON

23 May 2025
Published
03 Nov 2025
Updated

CVSS v3.1
LOW (2.9)
EPSS
0.02%

KEV

Description

parse_string in cJSON before 1.7.18 has a heap-based buffer over-read via {"1":1, with no trailing newline if cJSON_ParseWithLength is called.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 8 hours ago

Bluesky

Profile picture
๐Ÿ” URGENT SECURITY UPDATE for #Ubuntu users and #DevOps teams! Critical vulnerabilities (CVE-2023-26819, CVE-2023-53154, CVE-2025-57052) discovered in cJSONโ€”the lightweight JSON parser used across Ubuntu 20.04-25.10. Read more: ๐Ÿ‘‰ tinyurl.com/4w49jw9s #Security
  • 0
  • 1
  • 0
  • 8h ago

Overview

  • VMware vCenter Server

18 Jun 2024
Published
24 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
36.73%

KEV

Description

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture

As it is public now* I'm able to talk about it.

Check your VMware infrastructure. CVE-2024-37079 is known to have been exploited in the wild.

> UPDATE: Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild.

euvd.enisa.europa.eu/vulnerabi
euvd.enisa.europa.eu/vulnerabi
euvd.enisa.europa.eu/vulnerabi

support.broadcom.com/web/ecx/s

#infosec #itsec #itsecurity

* technically since Friday.

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Academy Software Foundation
  • OpenEXR

23 Dec 2025
Published
24 Dec 2025
Updated

CVSS v3.0
HIGH (7.8)
EPSS
0.05%

KEV

Description

Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27946.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture
Critical security advisory: #Fedora 42 mingw-openexr update addresses 7 vulnerabilities including multiple RCE flaws in EXR file parsing (CVE-2025-12839, CVE-2025-12840, CVE-2025-12495). Read more: ๐Ÿ‘‰ tinyurl.com/3sya8sbb #Security
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • VMware vCenter Server

18 Jun 2024
Published
02 Aug 2024
Updated

CVSS v3.1
HIGH (7.8)
EPSS
49.73%

KEV

Description

The vCenter Server contains multiple local privilege escalation vulnerabilities due to misconfiguration of sudo.ย An authenticated local user with non-administrative privileges may exploit these issues to elevate privileges to root on vCenter Server Appliance.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture

As it is public now* I'm able to talk about it.

Check your VMware infrastructure. CVE-2024-37079 is known to have been exploited in the wild.

> UPDATE: Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild.

euvd.enisa.europa.eu/vulnerabi
euvd.enisa.europa.eu/vulnerabi
euvd.enisa.europa.eu/vulnerabi

support.broadcom.com/web/ecx/s

#infosec #itsec #itsecurity

* technically since Friday.

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Academy Software Foundation
  • OpenEXR

23 Dec 2025
Published
24 Dec 2025
Updated

CVSS v3.0
HIGH (7.8)
EPSS
0.05%

KEV

Description

Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27948.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture
Critical security advisory: #Fedora 42 mingw-openexr update addresses 7 vulnerabilities including multiple RCE flaws in EXR file parsing (CVE-2025-12839, CVE-2025-12840, CVE-2025-12495). Read more: ๐Ÿ‘‰ tinyurl.com/3sya8sbb #Security
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Academy Software Foundation
  • OpenEXR

23 Dec 2025
Published
24 Dec 2025
Updated

CVSS v3.0
HIGH (7.8)
EPSS
0.05%

KEV

Description

Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27947.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture
Critical security advisory: #Fedora 42 mingw-openexr update addresses 7 vulnerabilities including multiple RCE flaws in EXR file parsing (CVE-2025-12839, CVE-2025-12840, CVE-2025-12495). Read more: ๐Ÿ‘‰ tinyurl.com/3sya8sbb #Security
  • 0
  • 0
  • 0
  • 10h ago
Showing 41 to 47 of 47 CVEs