Search
Search Results (332515 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2023-6190 | 1 Ikcu | 1 University Information Management System | 2026-02-11 | 9.8 Critical |
| Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in İzmir Katip Çelebi University University Information Management System allows Absolute Path Traversal.This issue affects University Information Management System: before 30.11.2023. | ||||
| CVE-2026-26044 | 2026-02-11 | N/A | ||
| Not used | ||||
| CVE-2026-26043 | 2026-02-11 | N/A | ||
| Not used | ||||
| CVE-2026-26042 | 2026-02-11 | N/A | ||
| Not used | ||||
| CVE-2026-26041 | 2026-02-11 | N/A | ||
| Not used | ||||
| CVE-2026-26040 | 2026-02-11 | N/A | ||
| Not used | ||||
| CVE-2026-26039 | 2026-02-11 | N/A | ||
| Not used | ||||
| CVE-2026-26038 | 2026-02-11 | N/A | ||
| Not used | ||||
| CVE-2026-26037 | 2026-02-11 | N/A | ||
| Not used | ||||
| CVE-2026-26036 | 2026-02-11 | N/A | ||
| Not used | ||||
| CVE-2024-36355 | 2026-02-11 | N/A | ||
| Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution. | ||||
| CVE-2025-29950 | 2026-02-11 | N/A | ||
| Improper input validation in system management mode (SMM) could allow a privileged attacker to overwrite stack memory leading to arbitrary code execution. | ||||
| CVE-2025-29951 | 2026-02-11 | N/A | ||
| A buffer overflow in the AMD Secure Processor (ASP) bootloader could allow an attacker to overwrite memory, potentially resulting in privilege escalation and arbitrary code execution. | ||||
| CVE-2026-21349 | 1 Adobe | 1 Lightroom Desktop | 2026-02-11 | 7.8 High |
| Lightroom Desktop versions 15.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | ||||
| CVE-2025-30513 | 1 Intel | 1 Tdx Module | 2026-02-11 | 7.9 High |
| Race condition for some TDX Module within Ring 0: Hypervisor may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. | ||||
| CVE-2025-62676 | 1 Fortinet | 1 Forticlientwindows | 2026-02-11 | 6.4 Medium |
| An Improper Link Resolution Before File Access ('Link Following') vulnerability [CWE-59] vulnerability in Fortinet FortiClientWindows 7.4.0 through 7.4.4, FortiClientWindows 7.2.0 through 7.2.12, FortiClientWindows 7.0 all versions may allow a local low-privilege attacker to perform an arbitrary file write with elevated permissions via crafted named pipe messages. | ||||
| CVE-2026-22153 | 1 Fortinet | 1 Fortios | 2026-02-11 | 7.5 High |
| An Authentication Bypass by Primary Weakness vulnerability [CWE-305] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4 may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FSSO policy, when the remote LDAP server is configured in a specific way. | ||||
| CVE-2025-64157 | 1 Fortinet | 1 Fortios | 2026-02-11 | 6.7 Medium |
| A use of externally-controlled format string vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0 all versions allows an authenticated admin to execute unauthorized code or commands via specifically crafted configuration. | ||||
| CVE-2025-11142 | 1 Axis Communications Ab | 1 Axis Os | 2026-02-11 | 7.1 High |
| The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account. | ||||
| CVE-2026-0508 | 1 Sap Se | 1 Sap Business Objects Business Intgelligence Platform | 2026-02-11 | 7.3 High |
| The SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker with high privileges to insert malicious URL within the application. Upon successful exploitation, the victim may click on this malicious URL, resulting in an unvalidated redirect to the attacker-controlled domain and subsequently download the malicious content. This vulnerability has a high impact on the confidentiality and integrity of the application, with no effect on the availability of the application. | ||||