Search Results (11087 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-50617 1 Cipplanner 1 Cipace 2026-02-13 7.5 High
Vulnerabilities in the File Download and Get File handler components in CIPPlanner CIPAce before 9.17 allow attackers to download unauthorized files. An authenticated user can easily change the file id parameter or pass the physical file path in the URL query string to retrieve the files. (Retrieval is not intended without correct data access configured for documents.)
CVE-2026-2095 1 Flowring 1 Agentflow 2026-02-13 9.8 Critical
Agentflow developed by Flowring has an Authentication Bypass vulnerability, allowing unauthenticated remote attackers to exploit a specific functionality to obtain arbitrary user authentication token and log into the system as any user.
CVE-2026-2096 1 Flowring 1 Agentflow 2026-02-13 9.8 Critical
Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
CVE-2025-68707 1 Tycc 2 Tongyu Ax1800, Tongyu Ax1800 Firmware 2026-02-13 8.8 High
An authentication bypass vulnerability in the Tongyu AX1800 Wi-Fi 6 Router with firmware 1.0.0 allows unauthenticated network-adjacent attackers to perform arbitrary configuration changes without providing credentials, as long as a valid admin session is active. This can result in full compromise of the device (i.e., via unauthenticated access to /boaform/formSaveConfig and /boaform/admin endpoints).
CVE-2026-22764 1 Dell 1 Openmanage Network Integration 2026-02-13 4.3 Medium
Dell OpenManage Network Integration, versions prior to 3.9, contains an Improper Authentication vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
CVE-2026-25893 1 Frangoteam 1 Fuxa 2026-02-13 9.8 Critical
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. Prior to 1.2.10, an authentication bypass vulnerability in FUXA allows an unauthenticated, remote attacker to gain administrative access via the heartbeat refresh API and execute arbitrary code on the server. This issue has been patched in FUXA version 1.2.10.
CVE-2019-12749 3 Canonical, Freedesktop, Redhat 5 Ubuntu Linux, Dbus, Enterprise Linux and 2 more 2026-02-13 7.1 High
dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
CVE-2025-21185 1 Microsoft 1 Edge Chromium 2026-02-13 6.5 Medium
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2025-21380 1 Microsoft 2 Azure Marketplace, Marketplace Saas 2026-02-13 8.8 High
Improper access control in Azure SaaS Resources allows an authorized attacker to disclose information over a network.
CVE-2025-21340 1 Microsoft 16 Windows 10 1809, Windows 10 21h2, Windows 10 21h2 and 13 more 2026-02-13 5.5 Medium
Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
CVE-2025-21275 1 Microsoft 14 Windows 10 21h2, Windows 10 21h2, Windows 10 22h2 and 11 more 2026-02-13 7.8 High
Windows App Package Installer Elevation of Privilege Vulnerability
CVE-2025-21213 1 Microsoft 21 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 18 more 2026-02-13 4.6 Medium
Secure Boot Security Feature Bypass Vulnerability
CVE-2025-21202 1 Microsoft 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more 2026-02-13 6.1 Medium
Windows Recovery Environment Agent Elevation of Privilege Vulnerability
CVE-2025-21405 1 Microsoft 1 Visual Studio 2022 2026-02-13 7.3 High
Visual Studio Elevation of Privilege Vulnerability
CVE-2025-21301 1 Microsoft 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more 2026-02-13 6.5 Medium
Windows Geolocation Service Information Disclosure Vulnerability
CVE-2025-24989 1 Microsoft 1 Power Pages 2026-02-13 8.2 High
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you.
CVE-2025-21400 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2026-02-13 8 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2025-21337 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 3.3 Low
Windows NTFS Elevation of Privilege Vulnerability
CVE-2024-51954 3 Esri, Linux, Microsoft 3 Arcgis Server, Linux Kernel, Windows 2026-02-13 8.5 High
There is an improper access control issue in ArcGIS Server versions 11.3 and below on Windows and Linux which, under unique circumstances, could allow a remote, low‑privileged authenticated attacker to access secure services published to a standalone (unfederated) ArcGIS Server instance. Successful exploitation results in unauthorized access to protected services outside the attacker’s originally assigned authorization boundary, constituting a scope change. If exploited, this issue would have a high impact on confidentiality, a low impact on integrity, and no impact on the availability of the software.
CVE-2024-25699 3 Esri, Linux, Microsoft 4 Arcgis Enterprise, Portal For Arcgis, Linux Kernel and 1 more 2026-02-13 8.5 High
There is a difficult‑to‑exploit improper authentication issue in the Home application for Esri Portal for ArcGIS versions 11.2 and below on Windows and Linux, and ArcGIS Enterprise versions 11.1 and below on Kubernetes, which under unique circumstances could allow a remote, authenticated attacker with low‑privileged access to compromise the confidentiality, integrity, and availability of the software. Successful exploitation allows the attacker to cross an authentication and authorization boundary beyond their originally assigned access, resulting in a scope change.