Neueste Warnungen
| CVE-2025-68753 |
ALSA: firewire-motu: add bounds check in put_user loop for DSP events
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-71081 |
ASoC: stm32: sai: fix OF node leak on probe
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-21224 |
Azure Connected Machine Agent Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-21226 |
Azure Core shared client library for Python Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-21524 |
Azure Data Explorer Information Disclosure Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-21227 |
Azure Logic Apps Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-68756 |
block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-71082 |
Bluetooth: btusb: revert use of devm_kzalloc in btusb
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20815 |
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20830 |
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-21221 |
Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-71143 |
clk: samsung: exynos-clkout: Assign .num before accessing .hws
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-21520 |
Copilot Studio Information Disclosure Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-68151 |
CoreDNS gRPC/HTTPS/HTTP3 servers lack resource limits, enabling DoS via unbounded connections and oversized messages
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-15444 |
Crypt::Sodium::XS module versions prior to 0.000042, for Perl, include a vulnerable version of libsodium
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-0897 |
Denial of Service in Keras via Excessive Memory Allocation in HDF5 Metadata
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20871 |
Desktop Window Manager Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20814 |
DirectX Graphics Kernel Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20836 |
DirectX Graphics Kernel Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-71130 |
drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-71093 |
e1000: fix OOB in e1000_tbi_should_accept()
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-68795 |
ethtool: Avoid overflowing userspace buffer on stats query
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-71105 |
f2fs: use global inline_xattr_slab instead of per-sb slab cache
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20941 |
Host Process for Windows Tasks Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-71087 |
iavf: fix off-by-one issues in iavf_config_rss_reg()
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-24528 |
In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-62291 |
In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-21219 |
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-0861 |
Integer overflow in memalign leads to heap corruption
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-71089 |
iommu: disable SVA when CONFIG_X86 is set
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-71122 |
iommufd/selftest: Check for overflow in IOMMU_TEST_OP_ADD_RESERVED
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-68766 |
irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-68817 |
ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-68786 |
ksmbd: skip lock-range check on equal size to avoid size==0 underflow
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-0719 |
Libsoup: signed to unsigned conversion error leading to stack-based buffer overflow in libsoup ntlm authentication
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2025-68808 |
media: vidtv: initialize local pointers upon transfer of memory ownership
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20842 |
Microsoft DWM Core Library Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-21223 |
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20946 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20955 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20956 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20950 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20957 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20949 |
Microsoft Excel Security Feature Bypass Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20943 |
Microsoft Office Click-To-Run Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20953 |
Microsoft Office Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20952 |
Microsoft Office Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-21509 |
Microsoft Office Security Feature Bypass Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20963 |
Microsoft SharePoint Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
| CVE-2026-20951 |
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑23 | Hoch |
Seite 1