Search

Search Results (334991 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-58071 1 F5 24 Big-ip, Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager and 21 more 2026-02-26 7.5 High
When IPsec is configured on the BIG-IP system, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-1547 1 Watchguard 29 Firebox M270, Firebox M290, Firebox M370 and 26 more 2026-02-26 7.2 High
A stack-based buffer overflow vulnerability [CWE-121] in WatchGuard Fireware OS's certificate request command could allow an authenticated privileged user to execute arbitrary code via specially crafted CLI commands.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.2.
CVE-2025-62216 1 Microsoft 5 365, 365 Apps, Office 2021 and 2 more 2026-02-26 7.8 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-61933 1 F5 2 Big-ip, Big-ip Access Policy Manager 2026-02-26 6.1 Medium
A reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of BIG-IP APM that allows an attacker to run JavaScript in the context of the targeted logged-out user.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-66644 1 Arraynetworks 15 Ag1000, Ag1000t, Ag1000v5 and 12 more 2026-02-26 7.2 High
Array Networks ArrayOS AG before 9.4.5.9 allows command injection, as exploited in the wild in August through December 2025.
CVE-2025-60719 1 Microsoft 27 Windows, Windows 10, Windows 10 1607 and 24 more 2026-02-26 7 High
Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2025-57780 1 F5 3 F5os, F5os-a, F5os-c 2026-02-26 7.8 High
A vulnerability exists in F5OS-A and F5OS-C system that may allow an authenticated attacker with local access to escalate their privileges.  A successful exploit may allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-58098 1 Apache 1 Http Server 2026-02-26 8.3 High
Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
CVE-2025-60722 2 Google, Microsoft 3 Android, Onedrive, Onenote For Android 2026-02-26 6.5 Medium
Improper limitation of a pathname to a restricted directory ('path traversal') in OneDrive for Android allows an authorized attacker to elevate privileges over a network.
CVE-2025-61990 1 F5 25 Big-ip, Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager and 22 more 2026-02-26 7.5 High
When using a multi-bladed platform with more than one blade, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2024-9183 1 Gitlab 1 Gitlab 2026-02-26 7.7 High
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 prior to 18.4.5, 18.5 prior to 18.5.3, and 18.6 prior to 18.6.1 that could have allowed an authenticated user to obtain credentials from higher-privileged users and perform actions in their context under specific conditions.
CVE-2025-62217 1 Microsoft 26 Windows, Windows 10, Windows 10 1607 and 23 more 2026-02-26 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2025-58132 2 Microsoft, Zoom 6 Windows, Meeting Software Development Kit, Rooms and 3 more 2026-02-26 4.1 Medium
Command injection in some Zoom Clients for Windows may allow an authenticated user to conduct a disclosure of information via network access.
CVE-2025-22420 1 Google 1 Android 2026-02-26 7.8 High
In multiple locations, there is a possible way to leak audio files across user profiles due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2025-62218 1 Microsoft 15 Windows, Windows 10, Windows 10 1607 and 12 more 2026-02-26 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Wireless Provisioning System allows an authorized attacker to elevate privileges locally.
CVE-2025-10576 1 Hp 1 Sound Research 2026-02-26 N/A
Potential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. HP is releasing updated audio packages to mitigate the potential vulnerabilities.
CVE-2025-22432 1 Google 1 Android 2026-02-26 6.7 Medium
In notifyTimeout of CallRedirectionProcessor.java, there is a possible persistent connection due to improper input validation. This could lead to local escalation of privilege and background activity launches with User execution privileges needed. User interaction is not needed for exploitation.
CVE-2025-62219 1 Microsoft 15 Windows, Windows 10, Windows 10 1607 and 12 more 2026-02-26 7 High
Double free in Microsoft Wireless Provisioning System allows an authorized attacker to elevate privileges locally.
CVE-2025-10577 1 Hp 1 Sound Research 2026-02-26 N/A
Potential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. HP is releasing updated audio packages to mitigate the potential vulnerabilities
CVE-2025-32319 1 Google 1 Android 2026-02-26 6.7 Medium
In ensureBound of RemotePrintService.java, there is a possible way for a background app to keep foreground permissions due to a permissions bypass. This could lead to local escalation of privilege with user execution privileges needed. User interaction is not needed for exploitation.