Search

Search Results (325340 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-7195 1 Redhat 13 Acm, Advanced Cluster Security, Apicurio Registry and 10 more 2026-01-01 5.2 Medium
Early versions of Operator-SDK provided an insecure method to allow operator containers to run in environments that used a random UID. Operator-SDK before 0.15.2 provided a script, user_setup, which modifies the permissions of the /etc/passwd file to 664 during build time. Developers who used Operator-SDK before 0.15.2 to scaffold their operator may still be impacted by this if the insecure user_setup script is still being used to build new container images. In affected images, the /etc/passwd file is created during build time with group-writable permissions and a group ownership of root (gid=0). An attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
CVE-2025-13820 2026-01-01 N/A
The Comments WordPress plugin before 7.6.40 does not properly validate user's identity when using the disqus.com provider, allowing an attacker to log in to any user (when knowing their email address) when such user does not have an account on disqus.com yet.
CVE-2025-69413 1 Gitea 1 Gitea 2026-01-01 5.3 Medium
In Gitea before 1.25.2, /api/v1/user has different responses for failed authentication depending on whether a username exists.
CVE-2025-12245 1 Chatwoot 1 Chatwoot 2026-01-01 5.3 Medium
A vulnerability was identified in chatwoot up to 4.7.0. This vulnerability affects the function initPostMessageCommunication of the file app/javascript/sdk/IFrameHelper.js of the component Widget. The manipulation of the argument baseUrl leads to origin validation error. Remote exploitation of the attack is possible. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-14424 1 Gimp 1 Gimp 2026-01-01 7.8 High
GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.
CVE-2025-14423 1 Gimp 1 Gimp 2026-01-01 7.8 High
GIMP LBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of LBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28311.
CVE-2025-14422 1 Gimp 1 Gimp 2026-01-01 7.8 High
GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.
CVE-2025-22203 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22202 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22201 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22200 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22199 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22198 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22197 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22196 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22195 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22194 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22193 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22192 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
CVE-2025-22191 2026-01-01 N/A
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.