It was discovered that .NET did not properly handle input provided to its
Convert.TryToHexString method. An attacker could possibly use this issue
to execute arbitrary code. (CVE-2025-21171)
It was discovered that .NET did not properly handle an integer overflow
when processing certain specially crafted files. An attacker could
possibly use this issue to execute arbitrary code. (CVE-2025-21172)
Daniel Plaisted and Noah Gilson discovered that .NET insecurely handled
temporary file usage which could result in malicious package dependency
injection. An attacker could possibly use this issue to elevate privileges.
(CVE-2025-21173)
It was discovered that .NET did not properly perform input data validation
when processing certain specially crafted files. An attacker could
possibly use this issue to execute arbitrary code. (CVE-2025-21176)
More Stories
USN-7215-1: libxml2 vulnerability
Xisco Fauli discovered that libxml2 incorrectly handled custom SAX handlers. A remote attacker could possibly use this issue to perform...
USN-7214-1: HarfBuzz vulnerability
It was discovered that HarfBuzz incorrecty handled certain memory operations. A remote attacker could use this issue to cause HarfBuzz...
rsync-3.4.1-1.fc41
FEDORA-2025-3ec637e6e9 Packages in this update: rsync-3.4.1-1.fc41 Update description: New version 3.4.1, a couple of fixes for the 3.4.0 release. New...
rsync-3.4.1-1.fc40
FEDORA-2025-b28759cb95 Packages in this update: rsync-3.4.1-1.fc40 Update description: New version 3.4.1, a couple of fixes for the 3.4.0 release. Read...
USN-7213-1: poppler vulnerability
It was discovered that poppler incorrectly handled memory when opening certain PDF files. An attacker could possibly use this issue...
USN-7212-1: Python 2.7 vulnerabilities
It was discovered that Python incorrectly handled certain ZIP files. An attacker could possibly use this issue to cause a...