Search

Search Results (334996 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-55697 1 Microsoft 7 Azure, Azure Local, Windows Server and 4 more 2026-02-26 7.8 High
Heap-based buffer overflow in Azure Local allows an authorized attacker to elevate privileges locally.
CVE-2025-12907 1 Google 1 Chrome 2026-02-26 8.8 High
Insufficient validation of untrusted input in Devtools in Google Chrome prior to 140.0.7339.80 allowed a remote attacker to execute arbitrary code via user action in Devtools. (Chromium security severity: Low)
CVE-2025-58718 1 Microsoft 35 Remote, Remote Desktop, Remote Desktop Client and 32 more 2026-02-26 8.8 High
Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
CVE-2025-64685 1 Jetbrains 1 Youtrack 2026-02-26 8.1 High
In JetBrains YouTrack before 2025.3.104432 missing TLS certificate validation enabled data disclosure
CVE-2025-58720 1 Microsoft 22 Windows, Windows 10, Windows 10 1809 and 19 more 2026-02-26 7.8 High
Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally.
CVE-2025-64456 1 Jetbrains 1 Resharper 2026-02-26 8.4 High
In JetBrains ReSharper before 2025.2.4 missing signature verification in DPA Collector allows local privilege escalation
CVE-2025-58724 1 Microsoft 6 Arc Enabled Servers Azure Connected Machine Agent, Azure, Azure Agent and 3 more 2026-02-26 7.8 High
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2025-64457 1 Jetbrains 3 Dottrace, Resharper, Rider 2026-02-26 4.2 Medium
In JetBrains ReSharper, Rider and dotTrace before 2025.2.5 local privilege escalation was possible via race condition
CVE-2025-58726 1 Microsoft 30 Windows, Windows 10, Windows 10 1507 and 27 more 2026-02-26 7.5 High
Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
CVE-2025-12480 1 Gladinet 1 Triofox 2026-02-26 9.1 Critical
Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.
CVE-2025-58730 1 Microsoft 30 Windows, Windows 10, Windows 10 1507 and 27 more 2026-02-26 7 High
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
CVE-2025-46430 1 Dell 1 Display And Peripheral Manager 2026-02-26 7.3 High
Dell Display and Peripheral Manager, versions prior to 2.1.2.12, contains an Execution with Unnecessary Privileges vulnerability in the Installer. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
CVE-2025-58731 1 Microsoft 15 Windows, Windows 11, Windows 11 22h2 and 12 more 2026-02-26 7 High
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
CVE-2025-43079 2 Linux, Qualys 3 Linux, Cloud Agent, Cloud Agent For Linux 2026-02-26 6.3 Medium
The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to Mac and Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninstall script is executed with elevated privileges (e.g., via sudo) in an environment where $PATH has been manipulated, an attacker with root/sudo privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges.
CVE-2025-58733 1 Microsoft 32 Windows, Windows 10, Windows 10 1507 and 29 more 2026-02-26 7 High
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
CVE-2025-12967 1 Amazon 2 Aurora, Rds 2026-02-26 8 High
An issue in AWS Wrappers for Amazon Aurora PostgreSQL may allow for privilege escalation to rds_superuser role. A low privilege authenticated user can create a crafted function that could be executed with permissions of other Amazon Relational Database Service (RDS) users. We recommend customers upgrade to the following versions: AWS JDBC Wrapper to v2.6.5, AWS Go Wrapper to 2025-10-17, AWS NodeJS Wrapper to v2.0.1, AWS Python Wrapper to v1.4.0 and AWS PGSQL ODBC driver to v1.0.1
CVE-2025-58734 1 Microsoft 24 Windows, Windows 10 1507, Windows 10 1607 and 21 more 2026-02-26 7 High
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
CVE-2025-12428 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-02-26 8.8 High
Type Confusion in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
CVE-2025-58736 1 Microsoft 30 Windows, Windows 10, Windows 10 1507 and 27 more 2026-02-26 7 High
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
CVE-2025-12429 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-02-26 8.8 High
Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)