Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-3381

Summary
Assigner-CPANSec
Assigner Org ID-9b29abf9-4ab0-4765-b253-1875cd9b441e
Published At-05 Mar, 2026 | 01:28
Updated At-11 Mar, 2026 | 15:00
Rejected At-
Credits

Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib

Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib. Compress::Raw::Zlib includes a copy of the zlib library. Compress::Raw::Zlib version 2.220 includes zlib 1.3.2, which addresses findings fron the 7ASecurity audit of zlib. The includes fixs for CVE-2026-27171.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:CPANSec
Assigner Org ID:9b29abf9-4ab0-4765-b253-1875cd9b441e
Published At:05 Mar, 2026 | 01:28
Updated At:11 Mar, 2026 | 15:00
Rejected At:
▼CVE Numbering Authority (CNA)
Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib

Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib. Compress::Raw::Zlib includes a copy of the zlib library. Compress::Raw::Zlib version 2.220 includes zlib 1.3.2, which addresses findings fron the 7ASecurity audit of zlib. The includes fixs for CVE-2026-27171.

Affected Products
Vendor
PMQS
Product
Compress::Raw::Zlib
Collection URL
https://cpan.org/modules
Package Name
Compress-Raw-Zlib
Repo
https://github.com/pmqs/Compress-Raw-Zlib
Default Status
unaffected
Versions
Affected
  • From 0 through 2.219 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-1395CWE-1395 Dependency on Vulnerable Third-Party Component
Type: CWE
CWE ID: CWE-1395
Description: CWE-1395 Dependency on Vulnerable Third-Party Component
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Upgrade to Compress::Raw::Zlib 2.220 or later.

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
zlib 1.3.2 released.2026-02-17 00:00:00
Compress::Raw::Zlib 2.220 released.2026-02-27 00:00:00
Event: zlib 1.3.2 released.
Date: 2026-02-17 00:00:00
Event: Compress::Raw::Zlib 2.220 released.
Date: 2026-02-27 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://metacpan.org/release/PMQS/Compress-Raw-Zlib-2.221/source/Changes
release-notes
https://www.zlib.net/
N/A
https://github.com/madler/zlib
N/A
https://github.com/madler/zlib/releases/tag/v1.3.2
release-notes
https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/
technical-description
https://www.cve.org/CVERecord?id=CVE-2026-27171
vendor-advisory
related
vdb-entry
https://github.com/pmqs/Compress-Raw-Zlib/issues/41
issue-tracking
Hyperlink: https://metacpan.org/release/PMQS/Compress-Raw-Zlib-2.221/source/Changes
Resource:
release-notes
Hyperlink: https://www.zlib.net/
Resource: N/A
Hyperlink: https://github.com/madler/zlib
Resource: N/A
Hyperlink: https://github.com/madler/zlib/releases/tag/v1.3.2
Resource:
release-notes
Hyperlink: https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/
Resource:
technical-description
Hyperlink: https://www.cve.org/CVERecord?id=CVE-2026-27171
Resource:
vendor-advisory
related
vdb-entry
Hyperlink: https://github.com/pmqs/Compress-Raw-Zlib/issues/41
Resource:
issue-tracking
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:9b29abf9-4ab0-4765-b253-1875cd9b441e
Published At:05 Mar, 2026 | 02:16
Updated At:18 Mar, 2026 | 19:26

Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib. Compress::Raw::Zlib includes a copy of the zlib library. Compress::Raw::Zlib version 2.220 includes zlib 1.3.2, which addresses findings fron the 7ASecurity audit of zlib. The includes fixs for CVE-2026-27171.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

pmqs
pmqs
>>compress\>>\
cpe:2.3:a:pmqs:compress\:\:raw\:\:zlib:*:*:*:*:*:perl:*:*
Weaknesses
CWE IDTypeSource
CWE-1284Primarynvd@nist.gov
CWE ID: CWE-1284
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/9b29abf9-4ab0-4765-b253-1875cd9b441e
Third Party Advisory
https://github.com/madler/zlib9b29abf9-4ab0-4765-b253-1875cd9b441e
Product
https://github.com/madler/zlib/releases/tag/v1.3.29b29abf9-4ab0-4765-b253-1875cd9b441e
Release Notes
https://github.com/pmqs/Compress-Raw-Zlib/issues/419b29abf9-4ab0-4765-b253-1875cd9b441e
Issue Tracking
https://metacpan.org/release/PMQS/Compress-Raw-Zlib-2.221/source/Changes9b29abf9-4ab0-4765-b253-1875cd9b441e
Product
Release Notes
https://www.cve.org/CVERecord?id=CVE-2026-271719b29abf9-4ab0-4765-b253-1875cd9b441e
Third Party Advisory
https://www.zlib.net/9b29abf9-4ab0-4765-b253-1875cd9b441e
Product
Hyperlink: https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Resource:
Third Party Advisory
Hyperlink: https://github.com/madler/zlib
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Resource:
Product
Hyperlink: https://github.com/madler/zlib/releases/tag/v1.3.2
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Resource:
Release Notes
Hyperlink: https://github.com/pmqs/Compress-Raw-Zlib/issues/41
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Resource:
Issue Tracking
Hyperlink: https://metacpan.org/release/PMQS/Compress-Raw-Zlib-2.221/source/Changes
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Resource:
Product
Release Notes
Hyperlink: https://www.cve.org/CVERecord?id=CVE-2026-27171
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Resource:
Third Party Advisory
Hyperlink: https://www.zlib.net/
Source: 9b29abf9-4ab0-4765-b253-1875cd9b441e
Resource:
Product

Change History

0
Information is not available yet

Similar CVEs

29Records found

CVE-2022-4976
Matching Score-4
Assigner-CPAN Security Group
ShareView Details
Matching Score-4
Assigner-CPAN Security Group
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 61.66%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 00:33
Updated-13 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Archive::Unzip::Burst from 0.01 through 0.09 for Perl contains a bundled InfoZip library that is affected by several vulnerabilities

Archive::Unzip::Burst from 0.01 through 0.09 for Perl contains a bundled InfoZip library that is affected by several vulnerabilities. The bundled library is affected by CVE-2014-8139, CVE-2014-8140 and CVE-2014-8141.

Action-Not Available
Vendor-ETJ
Product-Archive::Unzip::Burst
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2008-2374
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-6.44% / 91.09%
||
7 Day CHG~0.00%
Published-07 Jul, 2008 | 23:00
Updated-17 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.

Action-Not Available
Vendor-n/aBlueZFedora Project
Product-fedorabluez-libsbluez-utilsn/a
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2026-4176
Matching Score-4
Assigner-CPAN Security Group
ShareView Details
Matching Score-4
Assigner-CPAN Security Group
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 7.00%
||
7 Day CHG~0.00%
Published-29 Mar, 2026 | 20:50
Updated-30 Mar, 2026 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib

Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib. Compress::Raw::Zlib is included in the Perl package as a dual-life core module, and is vulnerable to CVE-2026-3381 due to a vendored version of zlib which has several vulnerabilities, including CVE-2026-27171. The bundled Compress::Raw::Zlib was updated to version 2.221 in Perl blead commit c75ae9cc164205e1b6d6dbd57bd2c65c8593fe94.

Action-Not Available
Vendor-SHAY
Product-perl
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2022-37134
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.86% / 83.07%
||
7 Day CHG~0.00%
Published-22 Aug, 2022 | 14:41
Updated-03 Aug, 2024 | 10:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Buffer Overflow via /goform/form2Wan.cgi. When wantype is 3, l2tp_usrname will be decrypted by base64, and the result will be stored in v94, which does not check the size of l2tp_usrname, resulting in stack overflow.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-816_firmwaredir-816n/a
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2025-15444
Matching Score-4
Assigner-CPAN Security Group
ShareView Details
Matching Score-4
Assigner-CPAN Security Group
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 6.70%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 00:22
Updated-10 Mar, 2026 | 17:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crypt::Sodium::XS module versions prior to 0.000042, for Perl, include a vulnerable version of libsodium

Crypt::Sodium::XS module versions prior to 0.000042, for Perl, include a vulnerable version of libsodium libsodium <= 1.0.20 or a version of libsodium released before December 30, 2025 contains a vulnerability documented as CVE-2025-69277  https://www.cve.org/CVERecord?id=CVE-2025-69277 . The libsodium vulnerability states: In atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. 0.000042 includes a version of libsodium updated to 1.0.20-stable, released January 3, 2026, which includes a fix for the vulnerability.

Action-Not Available
Vendor-iambIAMB
Product-crypt\Crypt::Sodium::XS
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2022-36063
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.6||HIGH
EPSS-4.16% / 88.69%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 00:00
Updated-27 Oct, 2025 | 13:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
USBX Host CDC ECM integer underflow with buffer overflow

Azure RTOS USBx is a USB host, device, and on-the-go (OTG) embedded stack, fully integrated with Azure RTOS ThreadX and available for all Azure RTOS ThreadX–supported processors. Azure RTOS USBX implementation of host support for USB CDC ECM includes an integer underflow and a buffer overflow in the `_ux_host_class_cdc_ecm_mac_address_get` function which may be potentially exploited to achieve remote code execution or denial of service. Setting mac address string descriptor length to a `0` or `1` allows an attacker to introduce an integer underflow followed (string_length) by a buffer overflow of the `cdc_ecm -> ux_host_class_cdc_ecm_node_id` array. This may allow one to redirect the code execution flow or introduce a denial of service. The fix has been included in USBX release [6.1.12](https://github.com/azure-rtos/usbx/releases/tag/v6.1.12_rel). Improved mac address string descriptor length validation to check for unexpectedly small values may be used as a workaround.

Action-Not Available
Vendor-azure-rtosEclipse Foundation AISBLMicrosoft Corporation
Product-threadx_usbxusbx
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
CVE-2022-36938
Matching Score-4
Assigner-Meta Platforms, Inc.
ShareView Details
Matching Score-4
Assigner-Meta Platforms, Inc.
CVSS Score-9.8||CRITICAL
EPSS-2.01% / 83.73%
||
7 Day CHG~0.00%
Published-10 Nov, 2022 | 00:00
Updated-01 May, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DexLoader function get_stringidx_fromdex() in Redex prior to commit 3b44c64 can load an out of bound address when loading the string index table, potentially allowing remote code execution during processing of a 3rd party Android APK file.

Action-Not Available
Vendor-Facebook
Product-redexRedex
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2025-12219
Matching Score-4
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
ShareView Details
Matching Score-4
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
CVSS Score-10||CRITICAL
EPSS-0.06% / 20.01%
||
7 Day CHG~0.00%
Published-25 Oct, 2025 | 15:51
Updated-10 Nov, 2025 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vulnerable Components in Azure Access OS

Vulnerable Components in Azure Access OS.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.

Action-Not Available
Vendor-azure-accessAzure Access Technology
Product-blu-ic2blu-ic4_firmwareblu-ic2_firmwareblu-ic4BLU-IC2BLU-IC4
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2025-12220
Matching Score-4
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
ShareView Details
Matching Score-4
Assigner-a0340c66-c385-4f8b-991b-3d05f6fd5220
CVSS Score-10||CRITICAL
EPSS-0.06% / 20.01%
||
7 Day CHG~0.00%
Published-25 Oct, 2025 | 15:53
Updated-10 Nov, 2025 | 15:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Busybox 1.31.1 - Multiple Known Vulnerabilities

Busybox 1.31.1 - Multiple Known Vulnerabilities.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.

Action-Not Available
Vendor-azure-accessAzure Access Technology
Product-blu-ic2blu-ic4_firmwareblu-ic2_firmwareblu-ic4BLU-IC2BLU-IC4
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2025-10226
Matching Score-4
Assigner-15ede60e-6fda-426e-be9c-e788f151a377
ShareView Details
Matching Score-4
Assigner-15ede60e-6fda-426e-be9c-e788f151a377
CVSS Score-9.3||CRITICAL
EPSS-0.64% / 70.49%
||
7 Day CHG+0.17%
Published-10 Sep, 2025 | 12:38
Updated-19 Dec, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PostgreSQL Upgrade from v10 to v17.4 in AxxonSoft Axxon One (C-Werk) 2.0.8 and earlier to Address Multiple Vulnerabilities

Dependency on Vulnerable Third-Party Component (CWE-1395) in the PostgreSQL backend in AxxonSoft Axxon One (C-Werk) 2.0.8 and earlier on Windows and Linux allows a remote attacker to escalate privileges, execute arbitrary code, or cause denial-of-service via exploitation of multiple known CVEs present in PostgreSQL v10.x, which are resolved in PostgreSQL 17.4.

Action-Not Available
Vendor-axxonsoftAxxonSoftMicrosoft CorporationLinux Kernel Organization, Inc
Product-linux_kernelwindowsaxxon_oneAxxonOne C-Werk
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2026-3257
Matching Score-4
Assigner-CPAN Security Group
ShareView Details
Matching Score-4
Assigner-CPAN Security Group
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 18.06%
||
7 Day CHG~0.00%
Published-05 Mar, 2026 | 01:35
Updated-09 Mar, 2026 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UnQLite versions through 0.06 for Perl uses a potentially insecure version of the UnQLite library

UnQLite versions through 0.06 for Perl uses a potentially insecure version of the UnQLite library. UnQLite for Perl embeds the UnQLite library. Version 0.06 and earlier of the Perl module uses a version of the library from 2014 that may be vulnerable to a heap-based overflow.

Action-Not Available
Vendor-tokuhiromTOKUHIROM
Product-unqliteUnQLite
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2022-25727
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.32% / 55.10%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory Corruption in modem due to improper length check while copying into memory in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca4020_firmwarewcd9306_firmwarewcn3980_firmwareqca4010wcn3998wcd9306ar8031_firmwaremdm9205qcs405_firmwarewsa8810_firmwarewsa8815_firmwaremdm9207_firmwaremdm9206_firmwaremdm9607qca4010_firmwarecsra6620_firmwarear8031mdm9205_firmwareqcs405csra6640mdm8207_firmwareqca4024wsa8810wcn3980wsa8815qca4004wcd9335_firmwarewcn3999_firmwarewcd9330wcn3998_firmwaremdm8207csra6620qca4024_firmwarecsra6640_firmwarewcd9330_firmwaremdm9207mdm9206wcn3999wcd9335qca4020mdm9607_firmwareqca4004_firmwareSnapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2022-24754
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.5||HIGH
EPSS-0.47% / 64.43%
||
7 Day CHG~0.00%
Published-11 Mar, 2022 | 00:00
Updated-04 Nov, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer overflow in pjsip

PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.

Action-Not Available
Vendor-teluupjsipDebian GNU/Linux
Product-pjsipdebian_linuxpjproject
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2022-20385
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 35.66%
||
7 Day CHG~0.00%
Published-13 Sep, 2022 | 19:14
Updated-03 Aug, 2024 | 02:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this case, it is GSCAN_MAX), then it access polciy array 'policy[type]', which OOB access happens.Product: AndroidVersions: Android SoCAndroid ID: A-238379819

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2022-20699
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-10||CRITICAL
EPSS-89.90% / 99.58%
||
7 Day CHG~0.00%
Published-10 Feb, 2022 | 17:06
Updated-28 Oct, 2025 | 13:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-17||Apply updates per vendor instructions.
Cisco Small Business RV Series Routers Vulnerabilities

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv340w_firmwarerv340wrv340_firmwarerv345p_firmwarerv340rv345rv345_firmwarerv345pCisco Small Business RV Series Router FirmwareSmall Business RV160, RV260, RV340, and RV345 Series Routers
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2021-43267
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-72.62% / 98.78%
||
7 Day CHG~0.00%
Published-02 Nov, 2021 | 22:13
Updated-04 Aug, 2024 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectLinux Kernel Organization, Inc
Product-h300eh500sh300s_firmwareh410sh300sh300e_firmwarelinux_kernelh500eh410s_firmwarefedorah500s_firmwareh700s_firmwareh500e_firmwareh700eh700e_firmwareh700sn/a
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2021-31556
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.66% / 71.08%
||
7 Day CHG~0.00%
Published-12 Aug, 2021 | 21:38
Updated-03 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Oauth extension for MediaWiki through 1.35.2. MWOAuthConsumerSubmitControl.php does not ensure that the length of an RSA key will fit in a MySQL blob.

Action-Not Available
Vendor-n/aWikimedia FoundationFedora Project
Product-fedoramediawikin/a
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2020-36846
Matching Score-4
Assigner-9b29abf9-4ab0-4765-b253-1875cd9b441e
ShareView Details
Matching Score-4
Assigner-9b29abf9-4ab0-4765-b253-1875cd9b441e
CVSS Score-9.8||CRITICAL
EPSS-0.54% / 67.66%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 00:50
Updated-30 May, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IO::Compress::Brotli versions prior to 0.007 for Perl have an integer overflow in the bundled Brotli C library

A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library.  Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your IO::Compress::Brotli module to 0.007 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

Action-Not Available
Vendor-TIMLEGGE
Product-IO::Compress::Brotli
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2025-40906
Matching Score-4
Assigner-CPAN Security Group
ShareView Details
Matching Score-4
Assigner-CPAN Security Group
CVSS Score-9.8||CRITICAL
EPSS-0.60% / 69.45%
||
7 Day CHG~0.00%
Published-16 May, 2025 | 15:15
Updated-09 Sep, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BSON::XS versions 0.8.4 and earlier for Perl includes a bundled libbson 1.1.7, which has several vulnerabilities

BSON::XS versions 0.8.4 and earlier for Perl includes a bundled libbson 1.1.7, which has several vulnerabilities. Those include CVE-2017-14227, CVE-2018-16790, CVE-2023-0437, CVE-2024-6381, CVE-2024-6383, and CVE-2025-0755. BSON-XS was the official Perl XS implementation of MongoDB's BSON serialization, but this distribution has reached its end of life as of August 13, 2020 and is no longer supported.

Action-Not Available
Vendor-MongoDB, Inc.
Product-BSON::XS
CWE ID-CWE-1104
Use of Unmaintained Third Party Components
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-40914
Matching Score-4
Assigner-9b29abf9-4ab0-4765-b253-1875cd9b441e
ShareView Details
Matching Score-4
Assigner-9b29abf9-4ab0-4765-b253-1875cd9b441e
CVSS Score-9.8||CRITICAL
EPSS-0.54% / 67.61%
||
7 Day CHG~0.00%
Published-11 Jun, 2025 | 14:06
Updated-12 Jun, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow

Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.

Action-Not Available
Vendor-MIK
Product-CryptX
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2025-40912
Matching Score-4
Assigner-9b29abf9-4ab0-4765-b253-1875cd9b441e
ShareView Details
Matching Score-4
Assigner-9b29abf9-4ab0-4765-b253-1875cd9b441e
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 61.66%
||
7 Day CHG~0.00%
Published-11 Jun, 2025 | 17:48
Updated-12 Jun, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode

CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode. CryptX embeds the tomcrypt library. The versions of that library in CryptX before 0.065 may be susceptible to CVE-2019-17362.

Action-Not Available
Vendor-MIK
Product-CryptX
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2025-34203
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.19% / 40.43%
||
7 Day CHG+0.08%
Published-19 Sep, 2025 | 18:36
Updated-17 Nov, 2025 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vasion Print (formerly PrinterLogic) Use of Outdated, End-Of-Life, and Vulnerable Third-Party Components

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.1002 and Application versions prior to 20.0.2614 (VA and SaaS deployments) contain multiple Docker containers that include outdated, end-of-life, unsupported, or otherwise vulnerable third-party components (examples: Nginx 1.17.x, OpenSSL 1.1.1d, various EOL Alpine/Debian/Ubuntu base images, and EOL Laravel/PHP libraries). These components are present across many container images and increase the product's attack surface, enabling exploitation chains when leveraged by an attacker. Multiple distinct EOL versions and unpatched libraries across containers; Nginx binaries date from 2019 in several images and Laravel versions observed include EOL releases (for example Laravel 5.5.x, 5.7.x, 5.8.x). This vulnerability has been identified by the vendor as: V-2024-014 — Outdated Dependencies.

Action-Not Available
Vendor-vasionVasion
Product-virtual_appliance_applicationvirtual_appliance_hostPrint Virtual Appliance HostPrint Application
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2025-55398
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 27.59%
||
7 Day CHG~0.00%
Published-22 Aug, 2025 | 00:00
Updated-26 Aug, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in mouse07410 asn1c thru 0.9.29 (2025-03-20) - a fork of vlm asn1c. In UPER (Unaligned Packed Encoding Rules), asn1c-generated decoders fail to enforce INTEGER constraints when the bound is positive and exceeds 32 bits in length, potentially allowing incorrect or malicious input to be processed.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2025-43964
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.9||LOW
EPSS-0.23% / 45.68%
||
7 Day CHG~0.00%
Published-20 Apr, 2025 | 00:00
Updated-03 Nov, 2025 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In LibRaw before 0.21.4, tag 0x412 processing in phase_one_correct in decoders/load_mfbacks.cpp does not enforce minimum w0 and w1 values.

Action-Not Available
Vendor-librawLibRaw
Product-librawLibRaw
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CVE-2024-1610
Matching Score-4
Assigner-OPPO Mobile Telecommunication Corp., Ltd.
ShareView Details
Matching Score-4
Assigner-OPPO Mobile Telecommunication Corp., Ltd.
CVSS Score-8.7||HIGH
EPSS-0.22% / 45.05%
||
7 Day CHG~0.00%
Published-18 Dec, 2024 | 06:18
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OPPO Store app include remote account token hijacking and sensitive information leakage

In OPPO Store APP, there's a possible escalation of privilege due to improper input validation.

Action-Not Available
Vendor-OPPO
Product-OPPO Store APP
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CWE ID-CWE-287
Improper Authentication
CVE-2024-11948
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-3.46% / 87.54%
||
7 Day CHG~0.00%
Published-11 Dec, 2024 | 21:55
Updated-13 Dec, 2024 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GFI Archiver Telerik Web UI Remote Code Execution Vulnerability

GFI Archiver Telerik Web UI Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Authentication is not required to exploit this vulnerability. The specific flaw exists within the product installer. The issue results from the use of a vulnerable version of Telerik Web UI. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE. Was ZDI-CAN-24041.

Action-Not Available
Vendor-gfiGFI
Product-archiverArchiver
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2024-0552
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.82% / 74.48%
||
7 Day CHG~0.00%
Published-15 Jan, 2024 | 04:03
Updated-17 Mar, 2026 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intumit inc. SmartRobot - Remote Code Execution

Intumit inc. SmartRobot's web framwork has a remote code execution vulnerability. An unauthorized remote attacker can exploit this vulnerability to execute arbitrary commands on the remote server.

Action-Not Available
Vendor-intumitIntumit inc.intumit
Product-smartrobotSmartRobotsmartrobot
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-1395
Dependency on Vulnerable Third-Party Component
CVE-2009-4488
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.64% / 85.73%
||
7 Day CHG~0.00%
Published-13 Jan, 2010 | 20:00
Updated-21 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Varnish 2.0.6 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. NOTE: the vendor disputes the significance of this report, stating that "This is not a security problem in Varnish or any other piece of software which writes a logfile. The real problem is the mistaken belief that you can cat(1) a random logfile to your terminal safely.

Action-Not Available
Vendor-varnish.projects.linpron/a
Product-varnishn/a
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
CWE ID-CWE-20
Improper Input Validation
CVE-2022-36086
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.4||HIGH
EPSS-0.30% / 53.09%
||
7 Day CHG~0.00%
Published-07 Sep, 2022 | 22:50
Updated-22 Apr, 2025 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
linked_list_allocator vulnerable to out-of-bound writes on `Heap` initialization and `Heap::extend`

linked_list_allocator is an allocator usable for no_std systems. Prior to version 0.10.2, the heap initialization methods were missing a minimum size check for the given heap size argument. This could lead to out-of-bound writes when a heap was initialized with a size smaller than `3 * size_of::<usize>` because of metadata write operations. This vulnerability impacts all the initialization functions on the `Heap` and `LockedHeap` types, including `Heap::new`, `Heap::init`, `Heap::init_from_slice`, and `LockedHeap::new`. It also affects multiple uses of the `Heap::extend` method. Version 0.10.2 contains a patch for the issue. As a workaround, ensure that the heap is only initialized with a size larger than `3 * size_of::<usize>` and that the `Heap::extend` method is only called with sizes larger than `2 * size_of::<usize>()`. Also, ensure that the total heap size is (and stays) a multiple of `2 * size_of::<usize>()`.

Action-Not Available
Vendor-rust-osdevrust-osdev
Product-linked-list-allocatorlinked-list-allocator
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-1284
Improper Validation of Specified Quantity in Input
Details not found