Search
Search Results (335023 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2022-3766 | 1 Phpmyfaq | 1 Phpmyfaq | 2026-02-16 | 6.1 Medium |
| Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.8. | ||||
| CVE-2022-0088 | 1 Yourls | 1 Yourls | 2026-02-16 | 7.4 High |
| Cross-Site Request Forgery (CSRF) in GitHub repository yourls/yourls prior to 1.8.3. | ||||
| CVE-2025-23368 | 1 Redhat | 10 Build Keycloak, Data Grid, Integration and 7 more | 2026-02-16 | 8.1 High |
| A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI. | ||||
| CVE-2025-14443 | 1 Redhat | 1 Openshift | 2026-02-16 | 8.5 High |
| A flaw was found in ose-openshift-apiserver. This vulnerability allows internal network enumeration, service discovery, limited information disclosure, and potential denial-of-service (DoS) through Server-Side Request Forgery (SSRF) due to missing IP address and network-range validation when processing user-supplied image references. | ||||
| CVE-2025-9566 | 1 Redhat | 8 Enterprise Linux, Openshift, Openshift Devspaces and 5 more | 2026-02-16 | 8.1 High |
| There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1 | ||||
| CVE-2026-0964 | 1 Libssh | 1 Libssh | 2026-02-16 | N/A |
| No description is available for this CVE. | ||||
| CVE-2026-0965 | 1 Libssh | 1 Libssh | 2026-02-16 | N/A |
| No description is available for this CVE. | ||||
| CVE-2026-0966 | 1 Libssh | 1 Libssh | 2026-02-16 | N/A |
| No description is available for this CVE. | ||||
| CVE-2026-0968 | 1 Libssh | 1 Libssh | 2026-02-16 | N/A |
| No description is available for this CVE. | ||||
| CVE-2026-2272 | 1 Gimp | 1 Gimp | 2026-02-16 | 4.3 Medium |
| No description is available for this CVE. | ||||
| CVE-2026-2366 | 1 Keycloak | 1 Keycloak | 2026-02-16 | 3.1 Low |
| No description is available for this CVE. | ||||
| CVE-2025-38162 | 1 Linux | 1 Linux Kernel | 2026-02-16 | 5.5 Medium |
| In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: prevent overflow in lookup table allocation When calculating the lookup table size, ensure the following multiplication does not overflow: - desc->field_len[] maximum value is U8_MAX multiplied by NFT_PIPAPO_GROUPS_PER_BYTE(f) that can be 2, worst case. - NFT_PIPAPO_BUCKETS(f->bb) is 2^8, worst case. - sizeof(unsigned long), from sizeof(*f->lt), lt in struct nft_pipapo_field. Then, use check_mul_overflow() to multiply by bucket size and then use check_add_overflow() to the alignment for avx2 (if needed). Finally, add lt_size_check_overflow() helper and use it to consolidate this. While at it, replace leftover allocation using the GFP_KERNEL to GFP_KERNEL_ACCOUNT for consistency, in pipapo_resize(). | ||||
| CVE-2026-23766 | 1 Istio | 1 Istio | 2026-02-14 | 3.3 Low |
| DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | ||||
| CVE-2025-69634 | 1 Dolibarr | 1 Dolibarr | 2026-02-14 | 9 Critical |
| Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php NOTE: this is disputed by a third party who indicates that exploitation can only occur if an unprivileged user knows the token of an admin user. | ||||
| CVE-2026-26303 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26302 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26301 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26300 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26299 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26298 | 2026-02-14 | N/A | ||
| Not used | ||||