CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0CVE-2025-33220
https://notcve.org/view.php?id=CVE-2025-33220
28 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33220 • CWE-416: Use After Free •
CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 0CVE-2025-33219
https://notcve.org/view.php?id=CVE-2025-33219
28 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33219 • CWE-190: Integer Overflow or Wraparound •
CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0CVE-2025-33218
https://notcve.org/view.php?id=CVE-2025-33218
28 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33218 • CWE-190: Integer Overflow or Wraparound •
CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0CVE-2025-33217
https://notcve.org/view.php?id=CVE-2025-33217
28 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33217 • CWE-416: Use After Free •
CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1CVE-2020-36964 – YATinyWinFTP - Denial of Service
https://notcve.org/view.php?id=CVE-2020-36964
28 Jan 2026 — YATinyWinFTP contains a denial of service vulnerability that allows attackers to crash the FTP service by sending a 272-byte buffer with a trailing space. Attackers can exploit the service by connecting and sending a malformed command that triggers a buffer overflow and service crash. • https://www.vulncheck.com/advisories/yatinywinftp-denial-of-service • CWE-787: Out-of-bounds Write •
CVSS: 7.8EPSS: 0%CPEs: -EXPL: 1CVE-2020-36943 – aSc TimeTables 2021.6.2 - Denial of Service
https://notcve.org/view.php?id=CVE-2020-36943
28 Jan 2026 — aSc TimeTables 2021.6.2 contains a denial of service vulnerability that allows attackers to crash the application by overwriting subject title fields with excessive data. • https://www.vulncheck.com/advisories/asc-timetables-denial-of-service • CWE-770: Allocation of Resources Without Limits or Throttling •
CVSS: 9.4EPSS: 0%CPEs: 2EXPL: 0CVE-2026-24685 – OpenProject has Argument Injection on Repository module that allows Arbitrary File Write
https://notcve.org/view.php?id=CVE-2026-24685
28 Jan 2026 — The written contents consist of git show output (commit metadata and patch), but overwriting application or configuration files still leads to data loss and denial of service, impacting integrity and availability. • https://github.com/opf/openproject/security/advisories/GHSA-74p5-9pr3-r6pw • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVSS: 6.9EPSS: 0%CPEs: -EXPL: 1CVE-2026-1522 – Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bearer_response denial of service
https://notcve.org/view.php?id=CVE-2026-1522
28 Jan 2026 — Executing a manipulation can lead to denial of service. • https://github.com/open5gs/open5gs/commit/b19cf6a • CWE-404: Improper Resource Shutdown or Release •
CVSS: 5.8EPSS: 0%CPEs: 4EXPL: 0CVE-2026-1539 – Libsoup: libsoup: credential leakage via http redirects
https://notcve.org/view.php?id=CVE-2026-1539
28 Jan 2026 — A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. • https://access.redhat.com/security/cve/CVE-2026-1539 • CWE-201: Insertion of Sensitive Information Into Sent Data •
CVSS: 6.9EPSS: 0%CPEs: -EXPL: 1CVE-2026-1521 – Open5GS SGWC s5c-handler.c denial of service
https://notcve.org/view.php?id=CVE-2026-1521
28 Jan 2026 — Performing a manipulation results in denial of service. • https://github.com/open5gs/open5gs/commit/69b53add90a9479d7960b822fc60601d659c328b • CWE-404: Improper Resource Shutdown or Release •
