CVE Monitor
CVE-2021-44175
N/A
17 Mar 2025
CVE-2021-44174
N/A
17 Mar 2025
CVE-2021-44173
N/A
17 Mar 2025
CVE-2021-43079
N/A
17 Mar 2025
CVE-2021-43078
N/A
17 Mar 2025
CVE-2020-6645
N/A
17 Mar 2025
CVE-2018-9204
N/A
17 Mar 2025
CVE-2018-9203
N/A
17 Mar 2025
CVE-2018-9202
N/A
17 Mar 2025
CVE-2018-9201
N/A
17 Mar 2025
CVE-2018-9200
N/A
17 Mar 2025
CVE-2018-9199
N/A
17 Mar 2025
CVE-2018-9198
N/A
17 Mar 2025
CVE-2018-9197
N/A
17 Mar 2025
CVE-2018-9196
N/A
17 Mar 2025
CVE-2018-1358
N/A
17 Mar 2025
CVE-2017-17548
N/A
17 Mar 2025
CVE-2017-17547
N/A
17 Mar 2025
CVE-2017-17546
N/A
17 Mar 2025
CVE-2017-17545
N/A
17 Mar 2025
CVE-2017-17542
N/A
17 Mar 2025
CVE-2025-29913
HIGH
17 Mar 2025
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. A critical heap buffer overflow vulnerability was identified in the `Crypto_TC_Prep_AAD` function of CryptoLib versions 1.3.3 and prior. This vulnerability allows an attacker to trigger a Denial of Service (DoS) or potentially execute arbitrary code (RCE) by providing a maliciously crafted telecommand (TC) frame that causes an unsigned integer underflow. The vulnerability lies in the function `Crypto_TC_Prep_AAD`, specifically during the computation of `tc_mac_start_index`. The affected code incorrectly calculates the MAC start index without ensuring it remains within the bounds of the `ingest` buffer. When `tc_mac_start_index` underflows due to an incorrect length calculation, the function attempts to access an out-of-bounds memory location, leading to a segmentation fault. The vulnerability is still present in the repository as of commit `d3cc420ace96d02a5b7e83d88cbd2e48010d5723`.
CVE-2025-29912
HIGH
17 Mar 2025
CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. In versions 1.3.3 and prior, an unsigned integer underflow in the `Crypto_TC_ProcessSecurity` function of CryptoLib leads to a heap buffer overflow. The vulnerability is triggered when the `fl` (frame length) field in a Telecommand (TC) packet is set to 0. This underflow causes the frame length to be interpreted as 65535, resulting in out-of-bounds memory access. This critical vulnerability can be exploited to cause a denial of service (DoS) or potentially achieve remote code execution. Users of CryptoLib are advised to apply the recommended patch or avoid processing untrusted TC packets until a fix is available.
CVE-2023-22512
HIGH
17 Mar 2025
This High severity DoS (Denial of Service) vulnerability was introduced in version 5.6.0 of Confluence Data Center and Server. With a CVSS Score of 7.5, this vulnerability allows an unauthenticated attacker to cause a resource to be unavailable for its intended users by temporarily or indefinitely disrupting services of a vulnerable host (Confluence instance) connected to a network, which has no impact to confidentiality, no impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.14 Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.1 Confluence Data Center and Server 8.6 or above: No need to upgrade, you're already on a patched version See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ]). This vulnerability was reported via our Bug Bounty program.
CVE-2025-2420
MEDIUM
17 Mar 2025
A vulnerability classified as problematic was found in 猫宁i Morning up to bc782730c74ff080494f145cc363a0b4f43f7d3e. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.