CVE-2025-2720
Published Mar 25, 2025
Last updated 9 days ago
- Description
- Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: According to the code maintainer the call of the POC is invalid because the buffer pointed to by "data" must have "len" valid bytes. The docs were updated to make that clear.
- Source
- cna@vuldb.com
- NVD status
- Rejected
- Hype score
- Not currently trending
CVE-2025-2720 A vulnerability was found in GNOME libgsf up to 1.14.53 and classified as problematic. Affected by this issue is the function gsf_base64_encode_simple. The manipulation… https://t.co/lNlNPfMnFg
@CVEnew
24 Mar 2025
324 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
New post from https://t.co/uXvPWJy6tj (CVE-2025-2720 | GNOME libgsf up to 1.14.53 gsf_base64_encode_simple size uninitialized variable) has been published on https://t.co/MYAtztDRkt
@WolfgangSesin
24 Mar 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes