Search
Search Results (332794 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2022-45969 | 1 Alistgo | 1 Alist | 2026-02-13 | 9.8 Critical |
| Alist v3.4.0 is vulnerable to Directory Traversal, | ||||
| CVE-2022-45968 | 1 Alistgo | 1 Alist | 2026-02-13 | 8.8 High |
| Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one). | ||||
| CVE-2022-45970 | 1 Alistgo | 1 Alist | 2026-02-13 | 5.4 Medium |
| Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board. | ||||
| CVE-2026-20636 | 1 Apple | 4 Ios And Ipados, Macos, Safari and 1 more | 2026-02-13 | 6.5 Medium |
| The issue was addressed with improved memory handling. This issue is fixed in iOS 26.3 and iPadOS 26.3, Safari 26.3, macOS Tahoe 26.3, visionOS 26.3. Processing maliciously crafted web content may lead to an unexpected process crash. | ||||
| CVE-2026-20620 | 1 Apple | 1 Macos | 2026-02-13 | 7.7 High |
| An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An attacker may be able to cause unexpected system termination or read kernel memory. | ||||
| CVE-2026-20616 | 1 Apple | 3 Ios And Ipados, Macos, Visionos | 2026-02-13 | 6.5 Medium |
| An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. Processing a maliciously crafted USD file may lead to unexpected app termination. | ||||
| CVE-2025-68128 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2025-68127 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2025-68126 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2025-68125 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2025-68124 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2025-58184 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2025-58182 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2025-47915 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2024-34157 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2024-34154 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2023-45291 | 2026-02-13 | N/A | ||
| reserved but not needed | ||||
| CVE-2023-27533 | 5 Fedoraproject, Haxx, Netapp and 2 more | 15 Fedora, Curl, Active Iq Unified Manager and 12 more | 2026-02-13 | 9.8 Critical |
| A vulnerability in input validation exists in curl <8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system. | ||||
| CVE-2023-23915 | 4 Haxx, Netapp, Redhat and 1 more | 13 Curl, Active Iq Unified Manager, Clustered Data Ontap and 10 more | 2026-02-13 | 6.5 Medium |
| A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS. | ||||
| CVE-2021-35942 | 4 Debian, Gnu, Netapp and 1 more | 8 Debian Linux, Glibc, Active Iq Unified Manager and 5 more | 2026-02-13 | 9.1 Critical |
| The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations. | ||||