Neueste Warnungen
| CVE-2025-40172 |
accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-64656 |
Azure Application Gateway Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-64657 |
Azure Application Gateway Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-49752 |
Azure Bastion Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-60876 |
BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-60724 |
GDI+ Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-40165 |
media: nxp: imx8-isi: m2m: Fix streaming cleanup on release
|
MSRC | 2026‑02‑21 | Kritisch |
| CVE-2025-59245 |
Microsoft SharePoint Online Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Kritisch |
Seite 1