Neueste Warnungen
| CVE-2025-40172 |
accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-40211 |
ACPI: video: Fix use-after-free in acpi_video_switch_brightness()
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-62222 |
Agentic AI and Visual Studio Code Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-60753 |
An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-64656 |
Azure Application Gateway Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-64657 |
Azure Application Gateway Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-49752 |
Azure Bastion Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-59504 |
Azure Monitor Agent Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-62207 |
Azure Monitor Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-40146 |
blk-mq: fix potential deadlock while nr_requests grown
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-40205 |
btrfs: avoid potential out-of-bounds in btrfs_encode_fh()
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-60876 |
BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-40107 |
can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-47179 |
Configuration Manager Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2024-25621 |
containerd affected by a local privilege escalation via wide permissions on CRI directory
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-40194 |
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-40136 |
crypto: hisilicon/qm - request reserved interrupt for virtual function
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-40109 |
crypto: rng - Ensure set_ent is always present
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-59512 |
Customer Experience Improvement Program (CEIP) Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-12816 |
CVE-2025-12816
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-12969 |
CVE-2025-12969
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-12970 |
CVE-2025-12970
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-12977 |
CVE-2025-12977
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-11230 |
Denial of service vulnerability in HAProxy mjson library
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-60723 |
DirectX Graphics Kernel Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-59506 |
DirectX Graphics Kernel Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-60716 |
DirectX Graphics Kernel Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-11933 |
DoS Vulnerability in wolfSSL TLS 1.3 CKS Extension
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-40110 |
drm/vmwgfx: Fix a null-ptr access in the cursor snooper
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-40111 |
drm/vmwgfx: Fix Use-after-free in validation
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-62210 |
Dynamics 365 Field Service (online) Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-62211 |
Dynamics 365 Field Service (online) Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-64655 |
Dynamics OmniChannel SDK Storage Containers Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-40198 |
ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-40167 |
ext4: detect invalid INLINE_DATA + EXTENTS flag combination
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-40190 |
ext4: guard against EA inode refcount underflow in xattr update
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-40179 |
ext4: verify orphan file size is not too big
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-11935 |
Forward Secrecy Violation in WolfSSL TLS 1.3
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-60724 |
GDI+ Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-64660 |
GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-62453 |
GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-13601 |
Glib: integer overflow in in g_escape_uri_string()
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-61661 |
Grub2: grub2: out-of-bounds write via malicious usb device
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-61662 |
Grub2: missing unregister call for gettext command may lead to use-after-free
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-61663 |
Grub2: missing unregister call for normal commands may lead to use-after-free
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-61664 |
Grub2: missing unregister call for normal_exit command may lead to use-after-free
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-54771 |
Grub2: use-after-free in grub_file_close()
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-54770 |
Grub2: use-after-free in net_set_vlan
|
MSRC | 2026‑02‑21 | Mittel |
| CVE-2025-60710 |
Host Process for Windows Tasks Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Hoch |
| CVE-2025-11934 |
Improper Validation of Signature Algorithm Used in TLS 1.3 CertificateVerify
|
MSRC | 2026‑02‑21 | Niedrig |
Seite 1