A vulnerability classified as problematic was found in pacparser up to 1.3.x. Affected by this vulnerability is the function pacparser_find_proxy of the file src/pacparser.c. The manipulation of the argument url leads to buffer overflow. Attacking locally is a requirement. Upgrading to version 1.4.0 is able to address this issue. The name of the patch is 853e8f45607cb07b877ffd270c63dbcdd5201ad9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215443.
More Stories
perl-String-Compare-ConstantTime-0.321-19.fc40
FEDORA-2025-e6f5710dba Packages in this update: perl-String-Compare-ConstantTime-0.321-19.fc40 Update description: This release fixes CVE-2024-13939 (leaking the length of a secret string) Read...
perl-String-Compare-ConstantTime-0.321-21.fc41
FEDORA-2025-5d61874568 Packages in this update: perl-String-Compare-ConstantTime-0.321-21.fc41 Update description: This release fixes CVE-2024-13939 (leaking the length of a secret string) Read...
perl-String-Compare-ConstantTime-0.321-22.fc42
FEDORA-2025-ce51c124a5 Packages in this update: perl-String-Compare-ConstantTime-0.321-22.fc42 Update description: This release fixes CVE-2024-13939 (leaking the length of a secret string) Read...
uboot-tools-2025.04-1.fc42
FEDORA-2025-a3561bfc13 Packages in this update: uboot-tools-2025.04-1.fc42 Update description: Update to 2025.04 GA Update to 2025.04 RC5 Read More
CrushFTP Authentication Bypass
What is the Vulnerability?FortiGuard Labs has observed in-the-wild attack attempts targeting CVE-2025-31161, an authentication bypass vulnerability in CrushFTP managed file...
Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered Fortinet Products, the most severe of which could allow for remote code execution. FortiAnalyzer...