4845 results (0.006 seconds)

CVSS: 6.1EPSS: 0%CPEs: 7EXPL: 0

23 Mar 2026 — A flaw was found in the GNU Binutils BFD library, a widely used component for handling binary files such as object files and executables. The issue occurs when processing specially crafted XCOFF object files, where a relocation type value is not properly validated before being used. This can cause the program to read memory outside of intended bounds. As a result, affected tools may crash or expose unintended memory contents, leading to denial-of-service or limited information disclosure risks. Se encontró ... • https://access.redhat.com/security/cve/CVE-2026-4647 • CWE-125: Out-of-bounds Read •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

17 Feb 2026 — pybind: Improper use of Pybind A new version of Red Hat build of Ceph Storage has been released. •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 0

16 Feb 2026 — Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2. • https://bugzilla.mozilla.org/show_bug.cgi?id=2014390 • CWE-122: Heap-based Buffer Overflow •

CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0

12 Feb 2026 — Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation. PostgreSQL 18.1 and 18.0 are affected. • https://www.postgresql.org/support/security/CVE-2026-2007 • CWE-122: Heap-based Buffer Overflow •

CVSS: 6.3EPSS: 0%CPEs: 3EXPL: 0

12 Feb 2026 — ### Summary The `arrayLimit` option in qs does not enforce limits for comma-separated values when `comma: true` is enabled, allowing attackers to cause denial-of-service via memory exhaustion. This is a bypass of the array limit enforcement, similar to the bracket notation bypass addressed in GHSA-6rw7-vpxm-498p (CVE-2025-15284). ### Details When the `comma` option is set to `true` (not the default, but configurable in applications), qs allows parsing comma-separated strings as arrays (e.g., `?param=a,b,c` ... • https://github.com/ljharb/qs/commit/f6a7abff1f13d644db9b05fe4f2c98ada6bf8482 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

12 Feb 2026 — Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected. Multiple security issues were discovered in PostgreSQL, which may result in memory disclosure or the execution of arbitrary code. For the oldstable distribution (bookworm), th... • https://www.postgresql.org/support/security/CVE-2026-2003 • CWE-1287: Improper Validation of Specified Type of Input •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

12 Feb 2026 — Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected. Multiple security issues were discovered in PostgreSQL, which may result in memory disclosure or the execution of arbitrary code. For the oldstable distribution (bookworm), these problems have been fixed in version 15.16-0+deb12u1. • https://www.postgresql.org/support/security/CVE-2026-2004 • CWE-1287: Improper Validation of Specified Type of Input •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

12 Feb 2026 — Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected. Multiple security issues were discovered in PostgreSQL, which may result in memory disclosure or the execution of arbitrary code. For the oldstable distribution (bookworm), these problems have been fixed in version 15.16-0+deb12u1. • https://www.postgresql.org/support/security/CVE-2026-2005 • CWE-122: Heap-based Buffer Overflow •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

12 Feb 2026 — Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected. Multiple security issues were discovered in PostgreSQL, which may result in memory disclosure or the execution of arbitrary code. For the oldstable distribution (bookworm), these probl... • https://www.postgresql.org/support/security/CVE-2026-2006 • CWE-129: Improper Validation of Array Index •

CVSS: 7.0EPSS: 0%CPEs: 3EXPL: 0

11 Feb 2026 — A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the intended extraction directory by crafting a malicious tar archive containing unvalidated hardlink or symlink entries. If the tar archive is extracted with elevated privileges, this flaw can lead to privilege escalation, enabling an attacker to gain unauthorized access to critical system files. • https://access.redhat.com/security/cve/CVE-2026-26158 • CWE-73: External Control of File Name or Path •