Search

Search Results (331924 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-15339 1 Tanium 1 Service Discover 2026-02-06 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Discover.
CVE-2025-15341 1 Tanium 1 Service Benchmark 2026-02-06 6.5 Medium
Tanium addressed an incorrect default permissions vulnerability in Benchmark.
CVE-2025-5553 1 Phpgurukul 1 Rail Pass Management System 2026-02-06 7.3 High
A vulnerability classified as critical was found in PHPGurukul Rail Pass Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /download-pass.php. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2023-6425 1 Bigprof 1 Online Clinic Management System 2026-02-06 6.3 Medium
A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /clinic/medical_records_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
CVE-2022-40924 1 Phpgurukul 1 Zoo Management System 2026-02-06 7.2 High
Zoo Management System v1.0 has an arbitrary file upload vulnerability in the picture upload point of the "save_animal" file of the "Animals" module in the background management system.
CVE-2025-15335 1 Tanium 1 Service Threatresponse 2026-02-06 4.3 Medium
Tanium addressed an information disclosure vulnerability in Threat Response.
CVE-2025-15334 1 Tanium 1 Service Threatresponse 2026-02-06 4.3 Medium
Tanium addressed an information disclosure vulnerability in Threat Response.
CVE-2026-24883 2 Gnupg, Gpg4win 2 Gnupg, Gpg4win 2026-02-06 3.7 Low
In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig->data[] set to a NULL value, leading to a denial of service (application crash).
CVE-2026-24882 2 Gnupg, Gpg4win 2 Gnupg, Gpg4win 2026-02-06 8.4 High
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
CVE-2026-0537 1 Autodesk 1 3ds Max 2026-02-06 7.8 High
A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2026-0538 1 Autodesk 1 3ds Max 2026-02-06 7.8 High
A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2024-37385 2 Microsoft, Roundcube 3 Windows, Roundcube Webmail, Webmail 2026-02-06 9.8 Critical
Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 on Windows allows command injection via im_convert_path and im_identify_path. NOTE: this issue exists because of an incomplete fix for CVE-2020-12641.
CVE-2026-0660 1 Autodesk 1 3ds Max 2026-02-06 7.8 High
A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2026-1504 1 Google 1 Chrome 2026-02-06 6.5 Medium
Inappropriate implementation in Background Fetch API in Google Chrome prior to 144.0.7559.110 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
CVE-2025-15333 1 Tanium 1 Service Threatresponse 2026-02-06 4.3 Medium
Tanium addressed an information disclosure vulnerability in Threat Response.
CVE-2026-0227 2 Palo Alto Networks, Paloaltonetworks 5 Cloud Ngfw, Pan-os, Prisma Access and 2 more 2026-02-06 7.5 High
A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.
CVE-2025-15321 1 Tanium 1 Tanos 2026-02-06 2.7 Low
Tanium addressed an improper input validation vulnerability in Tanium Appliance.
CVE-2025-15332 1 Tanium 1 Service Threatresponse 2026-02-06 4.9 Medium
Tanium addressed an information disclosure vulnerability in Threat Response.
CVE-2025-14512 2 Gnome, Redhat 3 Glib, Enterprise Linux, Openshift 2026-02-06 6.5 Medium
A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
CVE-2025-68340 1 Linux 1 Linux Kernel 2026-02-06 7.0 High
In the Linux kernel, the following vulnerability has been resolved: team: Move team device type change at the end of team_port_add Attempting to add a port device that is already up will expectedly fail, but not before modifying the team device header_ops. In the case of the syzbot reproducer the gre0 device is already in state UP when it attempts to add it as a port device of team0, this fails but before that header_ops->create of team0 is changed from eth_header to ipgre_header in the call to team_dev_type_check_change. Later when we end up in ipgre_header() struct ip_tunnel* points to nonsense as the private data of the device still holds a struct team. Example sequence of iproute2 commands to reproduce the hang/BUG(): ip link add dev team0 type team ip link add dev gre0 type gre ip link set dev gre0 up ip link set dev gre0 master team0 ip link set dev team0 up ping -I team0 1.1.1.1 Move team_dev_type_check_change down where all other checks have passed as it changes the dev type with no way to restore it in case one of the checks that follow it fail. Also make sure to preserve the origial mtu assignment: - If port_dev is not the same type as dev, dev takes mtu from port_dev - If port_dev is the same type as dev, port_dev takes mtu from dev This is done by adding a conditional before the call to dev_set_mtu to prevent it from assigning port_dev->mtu = dev->mtu and instead letting team_dev_type_check_change assign dev->mtu = port_dev->mtu. The conditional is needed because the patch moves the call to team_dev_type_check_change past dev_set_mtu. Testing: - team device driver in-tree selftests - Add/remove various devices as slaves of team device - syzbot