Page 37 of 54472 results (0.024 seconds)

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

28 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33220 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 0

28 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33219 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

28 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33218 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

28 Jan 2026 — A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, and information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2025-33217 • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

28 Jan 2026 — YATinyWinFTP contains a denial of service vulnerability that allows attackers to crash the FTP service by sending a 272-byte buffer with a trailing space. Attackers can exploit the service by connecting and sending a malformed command that triggers a buffer overflow and service crash. • https://www.vulncheck.com/advisories/yatinywinftp-denial-of-service • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 1

28 Jan 2026 — aSc TimeTables 2021.6.2 contains a denial of service vulnerability that allows attackers to crash the application by overwriting subject title fields with excessive data. • https://www.vulncheck.com/advisories/asc-timetables-denial-of-service • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 9.4EPSS: 0%CPEs: 2EXPL: 0

28 Jan 2026 — The written contents consist of git show output (commit metadata and patch), but overwriting application or configuration files still leads to data loss and denial of service, impacting integrity and availability. • https://github.com/opf/openproject/security/advisories/GHSA-74p5-9pr3-r6pw • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 6.9EPSS: 0%CPEs: -EXPL: 1

28 Jan 2026 — Executing a manipulation can lead to denial of service. • https://github.com/open5gs/open5gs/commit/b19cf6a • CWE-404: Improper Resource Shutdown or Release •

CVSS: 5.8EPSS: 0%CPEs: 4EXPL: 0

28 Jan 2026 — A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. • https://access.redhat.com/security/cve/CVE-2026-1539 • CWE-201: Insertion of Sensitive Information Into Sent Data •

CVSS: 6.9EPSS: 0%CPEs: -EXPL: 1

28 Jan 2026 — Performing a manipulation results in denial of service. • https://github.com/open5gs/open5gs/commit/69b53add90a9479d7960b822fc60601d659c328b • CWE-404: Improper Resource Shutdown or Release •