Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

#96148269-fe82-4198-b1bf-3a73ce8bc92e

Security Advisories

Reported CVEsVendorsProductsReports
3Vulnerabilities found

CVE-2025-8854
Assigner-CyberArk Labs
ShareView Details
Assigner-CyberArk Labs
CVSS Score-8.4||HIGH
EPSS-0.08% / 23.27%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 04:24
Updated-11 Aug, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
bullet3 VHACD utility: stack-based buffer overflow in OFF parser (LoadOFF)

Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function.

Action-Not Available
Vendor-bulletphysics
Product-bullet3
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-0518
Assigner-CyberArk Labs
ShareView Details
Assigner-CyberArk Labs
CVSS Score-4.8||MEDIUM
EPSS-0.08% / 25.47%
||
7 Day CHG~0.00%
Published-16 Jan, 2025 | 16:45
Updated-05 Aug, 2025 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unchecked sscanf return value which leads to memory data leak

Unchecked Return Value, Out-of-bounds Read vulnerability in FFmpeg allows Read Sensitive Constants Within an Executable. This vulnerability is associated with program files https://github.Com/FFmpeg/FFmpeg/blob/master/libavfilter/af_pan.C . This issue affects FFmpeg: 7.1. Issue was fixed:  https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a This issue was discovered by: Simcha Kosman

Action-Not Available
Vendor-FFmpeg
Product-ffmpegFFmpeg
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-252
Unchecked Return Value
CVE-2024-7701
Assigner-CyberArk Labs
ShareView Details
Assigner-CyberArk Labs
CVSS Score-5.1||MEDIUM
EPSS-0.03% / 8.21%
||
7 Day CHG~0.00%
Published-15 Dec, 2024 | 10:56
Updated-05 Aug, 2025 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Misuse of SHA256 to create an encryption key

Use of Password Hash With Insufficient Computational Effort vulnerability in percona percona-toolkit allows Encryption Brute Forcing.This issue affects percona-toolkit: 3.6.0.

Action-Not Available
Vendor-perconapercona
Product-toolkitpercona-toolkit
CWE ID-CWE-916
Use of Password Hash With Insufficient Computational Effort