CVE-2025-58185
Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion. More information : https://go.dev/cl/709856
Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion. More information : https://go.dev/cl/709856
Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as “a=;”, an...
Due to the design of the name constraint checking algorithm, the processing time of some inputs scals non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains....
Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains. More...
When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped. More information : https://go.dev/cl/707776
The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs. More information : https://go.dev/cl/709858
On affected platforms, restricted users could view sensitive portions of the config database via a debug API (e.g., user password hashes) More information : https://www.arista.com/en/support/advisories-notices/security-advisory/22538-security-advisory-0124
Cryptographic validation of upgrade images could be circumventing by dropping a specifically crafted file into the upgrade ISO More information : https://www.arista.com/en/support/advisories-notices/security-advisory/22538-security-advisory-0124
The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component,...
On affected platforms, a restricted user could break out of the CLI sandbox to the system shell and elevate their privileges. More information : https://www.arista.com/en/support/advisories-notices/security-advisory/22538-security-advisory-0124
On affected platforms, restricted users could use SSH port forwarding to access host-internal services More information : https://www.arista.com/en/support/advisories-notices/security-advisory/22538-security-advisory-0124
On affected platforms, if SSH session multiplexing was configured on the client side, SSH sessions (e.g, scp, sftp) multiplexed onto the same channel could perform file-system operations after a configured session timeout expired More...
Prior to September 19, 2025, the Hospital Manager Backend Services exposed the ASP.NET tracing endpoint /trace.axd without authentication, allowing a remote attacker to obtain live request traces and sensitive information such as request metadata,...