|Vulnerability|Element|Version|Summary|CVSS V3.x|CVSS V2.0|WIP| |---|---|---|---|---|---|---| |[CVE-2013-7381](https://nvd.nist.gov/vuln/detail/CVE-2013-7381)|sdk/libnotify.bst|0.8.6|libnotify before 1.0.4 for Node.js allows remote attackers to execute arbitrary commands via unspecified characters in a call to libnotify.notify.|9.8|7.5|None| |[CVE-2025-3277](https://nvd.nist.gov/vuln/detail/CVE-2025-3277)|components/sqlite.bst|3.46.1|An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.|9.8||None| |[CVE-2025-47436](https://nvd.nist.gov/vuln/detail/CVE-2025-47436)|components/orc.bst|0.4.41|Heap-based Buffer Overflow vulnerability in Apache ORC. A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption. This issue affects Apache ORC C++ library: through 1.8.8, from 1.9.0 through 1.9.5, from 2.0.0 through 2.0.4, from 2.1.0 through 2.1.1. Users are recommended to upgrade to version 1.8.9, 1.9.6, 2.0.5, and 2.1.2, which fix the issue.|9.8||None| |[CVE-2025-6965](https://nvd.nist.gov/vuln/detail/CVE-2025-6965)|components/sqlite.bst|3.46.1|There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.|9.8||None| |[CVE-2020-1171](https://nvd.nist.gov/vuln/detail/CVE-2020-1171)|components/python3.bst|3.12.12|A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192.|8.8|9.3|None| |[CVE-2024-49050](https://nvd.nist.gov/vuln/detail/CVE-2024-49050)|components/python3.bst|3.12.12|Visual Studio Code Python Extension Remote Code Execution Vulnerability|8.8||None| |[CVE-2025-47219](https://nvd.nist.gov/vuln/detail/CVE-2025-47219)|components/gstreamer-plugins-ugly.bst|1.24.12|In GStreamer through 1.26.1, the isomp4 plugin's qtdemux_parse_trak function may read past the end of a heap buffer while parsing an MP4 file, possibly leading to information disclosure.|8.1||None| |[CVE-2025-58060](https://nvd.nist.gov/vuln/detail/CVE-2025-58060)|components/cups-base.bst|2.4.10|OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass. Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.|8.0||None| |[CVE-2020-1192](https://nvd.nist.gov/vuln/detail/CVE-2020-1192)|components/python3.bst|3.12.12|A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads workspace settings from a notebook file, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1171.|7.8|9.3|None| |[CVE-2020-17163](https://nvd.nist.gov/vuln/detail/CVE-2020-17163)|components/python3.bst|3.12.12|Visual Studio Code Python Extension Remote Code Execution Vulnerability|7.8||None| |[CVE-2024-55549](https://nvd.nist.gov/vuln/detail/CVE-2024-55549)|components/libxslt.bst|1.1.42|xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.|7.8||None| |[CVE-2025-24855](https://nvd.nist.gov/vuln/detail/CVE-2025-24855)|components/libxslt.bst|1.1.42|numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.|7.8||None| |[CVE-2025-2759](https://nvd.nist.gov/vuln/detail/CVE-2025-2759)|components/gstreamer-plugins-ugly.bst|1.24.12|GStreamer Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of GStreamer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the product installer. The issue results from incorrect permissions on folders. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user. Was ZDI-CAN-25448.|7.8||None| |[CVE-2025-49714](https://nvd.nist.gov/vuln/detail/CVE-2025-49714)|components/python3.bst|3.12.12|Trust boundary violation in Visual Studio Code - Python extension allows an unauthorized attacker to execute code locally.|7.8||None| |[CVE-2025-6021](https://nvd.nist.gov/vuln/detail/CVE-2025-6021)|components/libxml2.bst|2.13.9|A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.|7.5||None| |[CVE-2025-52194](https://nvd.nist.gov/vuln/detail/CVE-2025-52194)|components/sndfile.bst|1.2.2|A buffer overflow vulnerability exists in libsndfile version 1.2.2 and potentially earlier versions when processing malformed IRCAM audio files. The vulnerability occurs in the ircam_read_header function at src/ircam.c:164 during sample rate processing, leading to memory corruption and potential code execution.|7.5||None| |[CVE-2025-5914](https://nvd.nist.gov/vuln/detail/CVE-2025-5914)|components/libarchive.bst|3.7.4|A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.|7.3||None| |[CVE-2025-5222](https://nvd.nist.gov/vuln/detail/CVE-2025-5222)|components/icu.bst|75.1|A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.|7.0||None| |[CVE-2025-47183](https://nvd.nist.gov/vuln/detail/CVE-2025-47183)|components/gstreamer-plugins-ugly.bst|1.24.12|In GStreamer through 1.26.1, the isomp4 plugin's qtdemux_parse_tree function may read past the end of a heap buffer while parsing an MP4 file, leading to information disclosure.|6.6||None| |[CVE-2023-4969](https://nvd.nist.gov/vuln/detail/CVE-2023-4969)|components/opencl.bst|2.3.4|A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.|6.5||None| |[CVE-2024-45993](https://nvd.nist.gov/vuln/detail/CVE-2024-45993)|components/giflib.bst|5.2.2|Giflib Project v5.2.2 is vulnerable to a heap buffer overflow via gif2rgb.|6.5||None| |[CVE-2024-50613](https://nvd.nist.gov/vuln/detail/CVE-2024-50613)|components/sndfile.bst|1.2.2|libsndfile through 1.2.2 has a reachable assertion, that may lead to application exit, in mpeg_l3_encode.c mpeg_l3_encoder_close.|6.5||None| |[CVE-2025-58364](https://nvd.nist.gov/vuln/detail/CVE-2025-58364)|components/cups-base.bst|2.4.10|OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups & cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector "Network" is possible. The current versions of CUPS and cups-browsed projects have the attack vector "Adjacent" in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.|6.5||None| |[CVE-2025-1594](https://nvd.nist.gov/vuln/detail/CVE-2025-1594)|components/ffmpeg.bst|7.0.3|A vulnerability, which was classified as critical, was found in FFmpeg up to 7.1. This affects the function ff_aac_search_for_tns of the file libavcodec/aacenc_tns.c of the component AAC Encoder. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.|6.3|7.5|None| |[CVE-2025-5702](https://nvd.nist.gov/vuln/detail/CVE-2025-5702)|bootstrap/glibc.bst|2.40|The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.|5.6||None| |[CVE-2025-5745](https://nvd.nist.gov/vuln/detail/CVE-2025-5745)|bootstrap/glibc.bst|2.40|The strncmp implementation optimized for the Power10 processor in the GNU C Library version 2.40 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.|5.6||None| |[CVE-2025-47806](https://nvd.nist.gov/vuln/detail/CVE-2025-47806)|components/gstreamer-plugins-ugly.bst|1.24.12|In GStreamer through 1.26.1, the subparse plugin's parse_subrip_time function may write data past the bounds of a stack buffer, leading to a crash.|5.6||None| |[CVE-2025-47808](https://nvd.nist.gov/vuln/detail/CVE-2025-47808)|components/gstreamer-plugins-ugly.bst|1.24.12|In GStreamer through 1.26.1, the subparse plugin's tmplayer_parse_line function may dereference a NULL pointer while parsing a subtitle file, leading to a crash.|5.6||None| |[CVE-2025-47807](https://nvd.nist.gov/vuln/detail/CVE-2025-47807)|components/gstreamer-plugins-ugly.bst|1.24.12|In GStreamer through 1.26.1, the subparse plugin's subrip_unescape_formatting function may dereference a NULL pointer while parsing a subtitle file, leading to a crash.|5.5||None| |[CVE-2025-7545](https://nvd.nist.gov/vuln/detail/CVE-2025-7545)|bootstrap/binutils.bst|2.45|A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.|5.3|4.3|None| |[CVE-2025-7546](https://nvd.nist.gov/vuln/detail/CVE-2025-7546)|bootstrap/binutils.bst|2.45|A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.|5.3|4.3|None| |[CVE-2025-8176](https://nvd.nist.gov/vuln/detail/CVE-2025-8176)|components/libtiff.bst|4.6.0|A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.|5.3|4.3|None| |[CVE-2025-8177](https://nvd.nist.gov/vuln/detail/CVE-2025-8177)|components/libtiff.bst|4.6.0|A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer.|5.3|4.3|None| |[CVE-2025-11082](https://nvd.nist.gov/vuln/detail/CVE-2025-11082)|bootstrap/binutils.bst|2.45|A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with "[f]ixed for 2.46".|5.3|4.3|None| |[CVE-2025-11083](https://nvd.nist.gov/vuln/detail/CVE-2025-11083)|bootstrap/binutils.bst|2.45|A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".|5.3|4.3|None| |[CVE-2025-48174](https://nvd.nist.gov/vuln/detail/CVE-2025-48174)|components/libavif.bst|1.1.1|In libavif before 1.3.0, makeRoom in stream.c has an integer overflow and resultant buffer overflow in stream->offset+size.|4.5||None| |[CVE-2025-48175](https://nvd.nist.gov/vuln/detail/CVE-2025-48175)|components/libavif.bst|1.1.1|In libavif before 1.3.0, avifImageRGBToYUV in reformat.c has integer overflows in multiplications involving rgbRowBytes, yRowBytes, uRowBytes, and vRowBytes.|4.5||None| |[CVE-2025-25724](https://nvd.nist.gov/vuln/detail/CVE-2025-25724)|components/libarchive.bst|3.7.4|list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.|4.0||None| |[CVE-2025-5915](https://nvd.nist.gov/vuln/detail/CVE-2025-5915)|components/libarchive.bst|3.7.4|A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.|3.9||None| |[CVE-2025-5916](https://nvd.nist.gov/vuln/detail/CVE-2025-5916)|components/libarchive.bst|3.7.4|A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive.|3.9||None| |[CVE-2025-5918](https://nvd.nist.gov/vuln/detail/CVE-2025-5918)|components/libarchive.bst|3.7.4|A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.|3.9||None| |[CVE-2025-1373](https://nvd.nist.gov/vuln/detail/CVE-2025-1373)|components/ffmpeg.bst|7.0.3|A vulnerability was found in FFmpeg up to 7.1. It has been rated as problematic. Affected by this issue is the function mov_read_trak of the file libavformat/mov.c of the component MOV Parser. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The patch is identified as 43be8d07281caca2e88bfd8ee2333633e1fb1a13. It is recommended to apply a patch to fix this issue.|3.3|1.7|None| |[CVE-2025-11081](https://nvd.nist.gov/vuln/detail/CVE-2025-11081)|bootstrap/binutils.bst|2.45|A vulnerability was detected in GNU Binutils 2.45. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit is now public and may be used. The patch is named f87a66db645caf8cc0e6fc87b0c28c78a38af59b. It is suggested to install a patch to address this issue.|3.3|1.7|None| |[CVE-2025-11412](https://nvd.nist.gov/vuln/detail/CVE-2025-11412)|bootstrap/binutils.bst|2.45|A vulnerability has been found in GNU Binutils 2.45. This impacts the function bfd_elf_gc_record_vtentry of the file bfd/elflink.c of the component Linker. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 047435dd988a3975d40c6626a8f739a0b2e154bc. To fix this issue, it is recommended to deploy a patch.|3.3|1.7|None| |[CVE-2025-11413](https://nvd.nist.gov/vuln/detail/CVE-2025-11413)|bootstrap/binutils.bst|2.45|A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised.|3.3|1.7|None| |[CVE-2025-11414](https://nvd.nist.gov/vuln/detail/CVE-2025-11414)|bootstrap/binutils.bst|2.45|A vulnerability was determined in GNU Binutils 2.45. Affected by this vulnerability is the function get_link_hash_entry of the file bfd/elflink.c of the component Linker. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.46 addresses this issue. Patch name: aeaaa9af6359c8e394ce9cf24911fec4f4d23703. It is advisable to upgrade the affected component.|3.3|1.7|None| |[CVE-2025-11494](https://nvd.nist.gov/vuln/detail/CVE-2025-11494)|bootstrap/binutils.bst|2.45|A vulnerability was found in GNU Binutils 2.45. Impacted is the function _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is identified as b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a. A patch should be applied to remediate this issue.|3.3|1.7|None| |[CVE-2025-11495](https://nvd.nist.gov/vuln/detail/CVE-2025-11495)|bootstrap/binutils.bst|2.45|A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.|3.3|1.7|None| |[CVE-2025-11839](https://nvd.nist.gov/vuln/detail/CVE-2025-11839)|bootstrap/binutils.bst|2.45|A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be exploited.|3.3|1.7|None| |[CVE-2025-11840](https://nvd.nist.gov/vuln/detail/CVE-2025-11840)|bootstrap/binutils.bst|2.45|A weakness has been identified in GNU Binutils 2.45. The affected element is the function vfinfo of the file ldmisc.c. Executing manipulation can lead to out-of-bounds read. The attack can only be executed locally. The exploit has been made available to the public and could be exploited. This patch is called 16357. It is best practice to apply a patch to resolve this issue.|3.3|1.7|None| |[CVE-2025-43966](https://nvd.nist.gov/vuln/detail/CVE-2025-43966)|components/libheif.bst|1.18.2|libheif before 1.19.6 has a NULL pointer dereference in ImageItem_iden in image-items/iden.cc.|2.9||None| |[CVE-2025-43967](https://nvd.nist.gov/vuln/detail/CVE-2025-43967)|components/libheif.bst|1.18.2|libheif before 1.19.6 has a NULL pointer dereference in ImageItem_Grid::get_decoder in image-items/grid.cc because a grid image can reference a nonexistent image item.|2.9||None| |[CVE-2025-5917](https://nvd.nist.gov/vuln/detail/CVE-2025-5917)|components/libarchive.bst|3.7.4|A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation.|2.8||None| |[CVE-2025-30258](https://nvd.nist.gov/vuln/detail/CVE-2025-30258)|components/gnupg.bst|2.5.1|In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."|2.7||None| |[CVE-2024-13978](https://nvd.nist.gov/vuln/detail/CVE-2024-13978)|components/libtiff.bst|4.6.0|A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue.|2.5|1.0|None| |[CVE-2025-8534](https://nvd.nist.gov/vuln/detail/CVE-2025-8534)|components/libtiff.bst|4.6.0|A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."|2.5|1.0|None| |[CVE-2008-3844](https://nvd.nist.gov/vuln/detail/CVE-2008-3844)|components/openssh.bst|10.2|Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.||9.3|None| |[CVE-2008-0731](https://nvd.nist.gov/vuln/detail/CVE-2008-0731)|components/apparmor-base.bst|4.1.2|The Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.||7.5|None| |[CVE-2009-0032](https://nvd.nist.gov/vuln/detail/CVE-2009-0032)|components/cups-base.bst|2.4.10|CUPS on Mandriva Linux 2008.0, 2008.1, 2009.0, Corporate Server (CS) 3.0 and 4.0, and Multi Network Firewall (MNF) 2.0 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/pdf.log temporary file.||6.9|None| |[CVE-2008-1033](https://nvd.nist.gov/vuln/detail/CVE-2008-1033)|components/cups-base.bst|2.4.10|The scheduler in CUPS in Apple Mac OS X 10.5 before 10.5.3, when debug logging is enabled and a printer requires a password, allows attackers to obtain sensitive information (credentials) by reading the log data, related to "authentication environment variables."||2.1|None| |[CVE-2025-3887](https://nvd.nist.gov/vuln/detail/CVE-2025-3887)|components/gstreamer-plugins-ugly.bst|1.24.12|GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H265 slice headers. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26596.|||None| |[CVE-2025-59777](https://nvd.nist.gov/vuln/detail/CVE-2025-59777)|components/libmicrohttpd.bst|1.0.2|NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.|||None| |[CVE-2025-62689](https://nvd.nist.gov/vuln/detail/CVE-2025-62689)|components/libmicrohttpd.bst|1.0.2|NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.|||None| |Elements missing version data|Data| |---|---| |components/tex-gyre-fonts.bst|https://mirrors.ctan.org/fonts/tex-gyre.zip |bootstrap/gnu-config.bst|https://git.savannah.gnu.org/git/config.git a2287c3041a3f2a204eb942e09c015eab00dc7dd |components/ca-certificates.bst|https://src.fedoraproject.org/rpms/ca-certificates.git 91af9300e9ca630b72f466b317bc489446838db8 |components/libfdk-aac.bst|https://gitlab.freedesktop.org/wtaymans/fdk-aac-stripped 0fc0e0e0b89de3becd5f099eae725f13eeecc0d1 |components/google-crosextra-caladea.bst|https://github.com/huertatipografica/Caladea.git 336a529cfad3d103d6527752686f8331d13e820a |components/google-crosextra-carlito.bst|https://github.com/googlefonts/carlito.git 3a810cab78ebd6e2e4eed42af9e8453c4f9b850a