Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,261
Critical855
High2,811
Medium10,399
Reset
Showing 1881-1900 of 14261 records
Threat Entry Updated 2026-01-12

CVE-2026-21689 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccProfileXml::ParseBasic()` at `IccXML/IccLibXML/IccProfileXml.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21689

MEDIUM CVSS 6.5 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-21690 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccTagXmlTagData::ToXml()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21690

MEDIUM CVSS 6.3 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-21691 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccTag:IsTypeCompressed()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21691

MEDIUM CVSS 5.4 2026-01-07
Threat Entry Updated 2026-01-23

CVE-2026-21441 - Urllib3 Plugin

urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the…

PLUGIN Urllib3

CVE-2026-21441

HIGH CVSS 8.9 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-21683 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `icStatusCMM::CIccEvalCompare::EvaluateProfile()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21683

HIGH CVSS 8.8 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-21687 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have Undefined Behavior in `CIccTagCurve::CIccTagCurve()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21687

HIGH CVSS 7.1 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-21686 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have Undefined Behavior in `CIccTagLutAtoB::Validate()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21686

HIGH CVSS 7.1 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-21685 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have Undefined Behavior in `CIccTagLut16::Read()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21685

HIGH CVSS 7.1 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-21684 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have Undefined Behavior in `CIccTagSpectralViewingConditions()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21684

HIGH CVSS 7.1 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-22189 - Panda3D Plugin

Panda3D versions up to and including 1.10.16 egg-mkfont contains a stack-based buffer overflow vulnerability due to use of an unbounded sprintf() call with attacker-controlled input. When constructing glyph filenames, egg-mkfont formats a user-supplied glyph pattern (-gp) into a fixed-size stack buffer without length validation. Supplying an excessively long glyph pattern string can overflow the stack buffer, resulting in memory corruption and a deterministic crash. Depending on build configuration and execution environment, the overflow may also be exploitable for arbitrary code execution.

PLUGIN Panda3D

CVE-2026-22189

MEDIUM CVSS 6.9 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-22190 - Panda3D Plugin

Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values.

PLUGIN Panda3D

CVE-2026-22190

MEDIUM CVSS 5.1 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-22188 - Panda3D Plugin

Panda3D versions up to and including 1.10.16 deploy-stub contains a denial of service vulnerability due to unbounded stack allocation. The deploy-stub executable allocates argv_copy and argv_copy2 using alloca() based directly on the attacker-controlled argc value without validation. Supplying a large number of command-line arguments can exhaust stack space and propagate uninitialized stack memory into Python interpreter initialization, resulting in a reliable crash and undefined behavior.

PLUGIN Panda3D

CVE-2026-22188

MEDIUM CVSS 6.9 2026-01-07
Threat Entry Updated 2026-02-26

CVE-2026-22187 - Bio-Formats Plugin

Bio-Formats versions up to and including 8.3.0 perform unsafe Java deserialization of attacker-controlled memoization cache files (.bfmemo) during image processing. The loci.formats.Memoizer class automatically loads and deserializes memo files associated with images without validation, integrity checks, or trust enforcement. An attacker who can supply a crafted .bfmemo file alongside an image can trigger deserialization of untrusted data, which may result in denial of service, logic manipulation, or potentially remote code execution in environments where suitable gadget chains are present on the classpath.

PLUGIN Bio-Formats

CVE-2026-22187

MEDIUM CVSS 6.8 2026-01-07
Threat Entry Updated 2026-02-26

CVE-2026-22186 - Bio-Formats Plugin

Bio-Formats versions up to and including 8.3.0 contain an XML External Entity (XXE) vulnerability in the Leica Microsystems metadata parsing component (e.g., XLEF). The parser uses an insecurely configured DocumentBuilderFactory when processing Leica XML-based metadata files, allowing external entity expansion and external DTD loading. A crafted metadata file can trigger outbound network requests (SSRF), access local system resources where readable, or cause a denial of service during XML parsing.

PLUGIN Bio-Formats

CVE-2026-22186

MEDIUM CVSS 4.6 2026-01-07
Threat Entry Updated 2026-01-14

CVE-2026-21682 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a heap-buffer-overflow in `CIccXmlArrayType::ParseText()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21682

HIGH CVSS 8.8 2026-01-07
Threat Entry Updated 2026-01-14

CVE-2026-21681 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Undefined Behavior runtime error. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21681

HIGH CVSS 7.1 2026-01-07
Threat Entry Updated 2026-01-14

CVE-2026-22185 - OpenLDAP Plugin

OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.

PLUGIN OpenLDAP

CVE-2026-22185

MEDIUM CVSS 4.6 2026-01-07
Threat Entry Updated 2026-01-15

CVE-2026-22184 - Zlib Plugin

zlib versions up to and including 1.3.1.2 include a global buffer overflow in the untgz utility located under contrib/untgz. The vulnerability is limited to the standalone demonstration utility and does not affect the core zlib compression library. The flaw occurs when a user executes the untgz command with an excessively long archive name supplied via the command line, leading to an out-of-bounds write in a fixed-size global buffer.

PLUGIN Zlib

CVE-2026-22184

MEDIUM CVSS 4.6 2026-01-07
Threat Entry Updated 2026-02-03

CVE-2026-21856 - Tarkov Data Manager Plugin

The Tarkov Data Manager is a tool to manage the Tarkov item data. Prior to commit 9bdb3a75a98a7047b6d70144eb1da1655d6992a8, a time based blind SQL injection vulnerability in the webhook edit and scanner api endpoints that allow an authenticated attacker to execute arbitrary SQL queries against the MySQL database. Commit 9bdb3a75a98a7047b6d70144eb1da1655d6992a8 contains a patch.

PLUGIN Tarkov Data Manager

CVE-2026-21856

HIGH CVSS 7.2 2026-01-07
Threat Entry Updated 2026-02-03

CVE-2026-21854 - Tarkov Data Manager Plugin

The Tarkov Data Manager is a tool to manage the Tarkov item data. Prior to 02 January 2025, an authentication bypass vulnerability in the login endpoint allows any unauthenticated user to gain full admin access to the Tarkov Data Manager admin panel by exploiting a JavaScript prototype property access vulnerability, combined with loose equality type coercion. A series of fix commits on 02 January 2025 fixed this and other vulnerabilities.

PLUGIN Tarkov Data Manager

CVE-2026-21854

CRITICAL CVSS 9.8 2026-01-07
Scroll to top