6.5

CVSS3.1

CVE-2025-68471 - Avahi has a reachable assertion in lookup_start

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending 2 unsolicited announcements with CNAME resource records 2 seconds apart.

📅 Published: Jan. 12, 2026, 5:39 p.m. 🔄 Last Modified: Jan. 16, 2026, 4:53 p.m.

6.5

CVSS3.1

CVE-2025-68468 - Avahi has a reachable assertion in lookup_multicast_callback

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending unsolicited announcements containing CNAME resource records pointing it to resource records with short TTLs. As soon as they ex…

📅 Published: Jan. 12, 2026, 5:38 p.m. 🔄 Last Modified: Jan. 16, 2026, 4:52 p.m.

5.5

CVSS3.1

CVE-2025-68276 - Avahi has a reachable assertion in avahi_wide_area_scan_cache

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This …

📅 Published: Jan. 12, 2026, 5:31 p.m. 🔄 Last Modified: Jan. 16, 2026, 4:51 p.m.

6.4

CVSS3.1

CVE-2025-68657 - espressif/usb_host_hid Double-Free Race Condition in USB Host HID Device Close Path

Espressif ESP-IDF USB Host HID (Human Interface Device) Driver allows access to HID devices. Prior to 1.1.0, calls to hid_host_device_close() can free the same usb_transfer_t twice. The USB event callback and user code share the hid_iface_t state without locking, so both can tear down a READY inter…

📅 Published: Jan. 12, 2026, 5:26 p.m. 🔄 Last Modified: Jan. 22, 2026, 3:47 p.m.

6.8

CVSS3.1

CVE-2025-68656 - Espressif ESP-IDF USB Host HID (Human Interface Device) Driver Descriptor Use-After-Free Vulnerabil…

Espressif ESP-IDF USB Host HID (Human Interface Device) Driver allows access to HID devices. Prior to 1.1.0, usb_class_request_get_descriptor() frees and reallocates hid_device->ctrl_xfer when an oversized descriptor is requested but continues to use the stale local pointer, leading to an immediate…

📅 Published: Jan. 12, 2026, 5:23 p.m. 🔄 Last Modified: Jan. 22, 2026, 3:47 p.m.

6.9

CVSS4.0

CVE-2026-22050 -

ONTAP versions 9.16.1 prior to 9.16.1P9 and 9.17.1 prior to 9.17.1P2 with snapshot locking enabled are susceptible to a vulnerability which could allow a privileged remote attacker to set the snapshot expiry time to none.

📅 Published: Jan. 12, 2026, 5:15 p.m. 🔄 Last Modified: Jan. 22, 2026, 5:58 p.m.

6.8

CVSS3.1

CVE-2025-68622 - Espressif ESP-IDF USB Host UVC Class Driver has a stack buffer overflow in UVC descriptor printing

Espressif ESP-IDF USB Host UVC Class Driver allows video streaming from USB cameras. Prior to 2.4.0, a vulnerability in the esp-usb UVC host implementation allows a malicious USB Video Class (UVC) device to trigger a stack buffer overflow during configuration-descriptor parsing. When UVC configurat…

📅 Published: Jan. 12, 2026, 5:08 p.m. 🔄 Last Modified: Jan. 22, 2026, 3:50 p.m.

8.1

CVSS3.1

CVE-2025-68472 - MindsDB has improper sanitation of filepath that leads to information disclosure and DOS

MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.11.1, an unauthenticated path traversal in the file upload API lets any caller read arbitrary files from the server filesystem and move them into MindsDB’s storage, exposing sensitive data. The PUT …

📅 Published: Jan. 12, 2026, 4:53 p.m. 🔄 Last Modified: Feb. 20, 2026, 5:25 p.m.

8.2

CVSS3.1

CVE-2025-71063 -

Errands before 46.2.10 does not verify TLS certificates for CalDAV servers.

📅 Published: Jan. 12, 2026, 3:56 p.m. 🔄 Last Modified: Feb. 5, 2026, 7:46 p.m.

8.7

CVSS4.0

CVE-2025-41078 - Multiple vulnerabilities in Viafirma products

Weaknesses in the authorization mechanisms of Viafirma Documents v3.7.129 allow an authenticated user without privileges to list and access other user data, use user creation, modification, and deletion features, and escalate privileges by impersonating other users of the application in the generat…

📅 Published: Jan. 12, 2026, 2:59 p.m. 🔄 Last Modified: Jan. 29, 2026, 8:12 p.m.
Total resulsts: 344974
Page 1773 of 34,498
« previous page » next page
Filters