Search
Search Results (338378 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2022-0088 | 1 Yourls | 1 Yourls | 2026-02-16 | 7.4 High |
| Cross-Site Request Forgery (CSRF) in GitHub repository yourls/yourls prior to 1.8.3. | ||||
| CVE-2025-9566 | 1 Redhat | 8 Enterprise Linux, Openshift, Openshift Devspaces and 5 more | 2026-02-16 | 8.1 High |
| There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1 | ||||
| CVE-2026-0964 | 1 Libssh | 1 Libssh | 2026-02-16 | N/A |
| No description is available for this CVE. | ||||
| CVE-2026-0965 | 1 Libssh | 1 Libssh | 2026-02-16 | N/A |
| No description is available for this CVE. | ||||
| CVE-2026-0966 | 1 Libssh | 1 Libssh | 2026-02-16 | N/A |
| No description is available for this CVE. | ||||
| CVE-2026-0968 | 1 Libssh | 1 Libssh | 2026-02-16 | N/A |
| No description is available for this CVE. | ||||
| CVE-2026-2272 | 1 Gimp | 1 Gimp | 2026-02-16 | 4.3 Medium |
| No description is available for this CVE. | ||||
| CVE-2026-23766 | 1 Istio | 1 Istio | 2026-02-14 | 3.3 Low |
| DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | ||||
| CVE-2025-69634 | 1 Dolibarr | 1 Dolibarr | 2026-02-14 | 9 Critical |
| Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php NOTE: this is disputed by a third party who indicates that exploitation can only occur if an unprivileged user knows the token of an admin user. | ||||
| CVE-2026-26303 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26302 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26301 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26300 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26299 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26298 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26297 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26296 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2026-26295 | 2026-02-14 | N/A | ||
| Not used | ||||
| CVE-2025-9293 | 2 Tp-link, Tp Link | 14 Aginet App, Deco App, Festa App and 11 more | 2026-02-13 | N/A |
| A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data. | ||||
| CVE-2025-9292 | 1 Tp-link | 1 Omada Cloud Controller | 2026-02-13 | N/A |
| A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface. Successful exploitation could allow unauthorized disclosure of sensitive information. Fixed in updated Omada Cloud Controller service versions deployed automatically by TP‑Link. No user action is required. | ||||