Search

Search Results (332318 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-62676 1 Fortinet 1 Forticlientwindows 2026-02-11 6.4 Medium
An Improper Link Resolution Before File Access ('Link Following') vulnerability [CWE-59] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.4, FortiClientWindows 7.2.0 through 7.2.12, FortiClientWindows 7.0 all versions may allow a local low-privilege attacker to perform an arbitrary file write with elevated permissions via crafted named pipe messages.
CVE-2026-22153 1 Fortinet 1 Fortios 2026-02-11 7.5 High
An Authentication Bypass by Primary Weakness vulnerability [CWE-305] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4 may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FSSO policy, when the remote LDAP server is configured in a specific way.
CVE-2025-52436 1 Fortinet 1 Fortisandbox 2026-02-11 7.9 High
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.7, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions may allow an unauthenticated attacker to execute commands via crafted requests.
CVE-2025-64157 1 Fortinet 1 Fortios 2026-02-11 6.7 Medium
A use of externally-controlled format string vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0 all versions allows an authenticated admin to execute unauthorized code or commands via specifically crafted configuration.
CVE-2025-11142 1 Axis Communications Ab 1 Axis Os 2026-02-11 7.1 High
The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account.
CVE-2026-0508 1 Sap Se 1 Sap Business Objects Business Intgelligence Platform 2026-02-11 7.3 High
The SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker with high privileges to insert malicious URL within the application. Upon successful exploitation, the victim may click on this malicious URL, resulting in an unvalidated redirect to the attacker-controlled domain and subsequently download the malicious content. This vulnerability has a high impact on the confidentiality and integrity of the application, with no effect on the availability of the application.
CVE-2025-11547 1 Axis Communications Ab 1 Axis Camera Station Pro 2026-02-11 7.8 High
AXIS Camera Station Pro contained a flaw to perform a privilege escalation attack on the server as a non-admin user.
CVE-2026-23687 1 Sap Se 1 Sap Netweaver And Abap Platform 2026-02-11 8.8 High
SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tampered identity information, unauthorized access to sensitive user data and potential disruption of normal system usage.
CVE-2026-24319 1 Sap Se 1 Sap Business One (b1 Client Memory Dump Files) 2026-02-11 5.8 Medium
In SAP Business One, sensitive information is written to the application�s memory dump files without obfuscation. Gaining access to this information could potentially lead to unauthorized operations within the B1 environment, including modification of company data. This issue results in a high impact on confidentiality and integrity, with no impact on availability.
CVE-2026-25847 1 Jetbrains 1 Pycharm 2026-02-11 8.2 High
In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible
CVE-2026-21253 1 Microsoft 15 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 12 more 2026-02-11 7 High
Use after free in Mailslot File System allows an authorized attacker to elevate privileges locally.
CVE-2026-0488 1 Sap Se 1 Sap Crm And Sap S/4hana (scripting Editor) 2026-02-11 9.9 Critical
An authenticated attacker in SAP CRM and SAP S/4HANA (Scripting Editor) could exploit a flaw in a generic function module call and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement. This leads to a full database compromise with high impact on confidentiality, integrity, and availability.
CVE-2026-21523 1 Microsoft 1 Visual Studio Code 2026-02-11 8 High
Time-of-check time-of-use (toctou) race condition in GitHub Copilot and Visual Studio allows an authorized attacker to execute code over a network.
CVE-2026-21257 1 Microsoft 1 Visual Studio 2022 2026-02-11 8 High
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an authorized attacker to elevate privileges over a network.
CVE-2026-21256 1 Microsoft 1 Visual Studio 2022 2026-02-11 8.8 High
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code over a network.
CVE-2026-21643 1 Fortinet 1 Forticlientems 2026-02-11 9.1 Critical
An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
CVE-2026-21228 1 Microsoft 1 Azure Local 2026-02-11 8.1 High
Improper certificate validation in Azure Local allows an unauthorized attacker to execute code over a network.
CVE-2026-21531 1 Microsoft 1 Azure Ai Language Authoring 2026-02-11 9.8 Critical
Deserialization of untrusted data in Azure SDK allows an unauthorized attacker to execute code over a network.
CVE-2026-21251 1 Microsoft 5 Windows Server 2016, Windows Server 2019, Windows Server 2022 and 2 more 2026-02-11 7.8 High
Use after free in Windows Cluster Client Failover allows an authorized attacker to elevate privileges locally.
CVE-2026-21517 1 Microsoft 1 Windows App For Mac 2026-02-11 4.7 Medium
Improper link resolution before file access ('link following') in Windows App for Mac allows an authorized attacker to elevate privileges locally.