Search

Search Results (332177 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-38025 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2026-02-10 7.2 High
Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability
CVE-2024-38024 1 Microsoft 1 Sharepoint Server 2026-02-10 7.2 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38023 1 Microsoft 1 Sharepoint Server 2026-02-10 7.2 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38022 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2026-02-10 7 High
Windows Image Acquisition Elevation of Privilege Vulnerability
CVE-2024-38015 1 Microsoft 7 Windows Server 2012, Windows Server 2012 R2, Windows Server 2016 and 4 more 2026-02-10 7.5 High
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
CVE-2024-38013 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2026-02-10 6.7 Medium
Microsoft Windows Server Backup Elevation of Privilege Vulnerability
CVE-2024-37987 1 Microsoft 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more 2026-02-10 8 High
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37986 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2026-02-10 8 High
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37985 1 Microsoft 4 Windows 11 22h2, Windows 11 22h2, Windows 11 23h2 and 1 more 2026-02-10 5.9 Medium
Windows Kernel Information Disclosure Vulnerability
CVE-2024-37981 1 Microsoft 15 Windows 10 1809, Windows 10 21h2, Windows 10 21h2 and 12 more 2026-02-10 8 High
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37974 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2026-02-10 8 High
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37970 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2026-02-10 8 High
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37969 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2026-02-10 8 High
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-35270 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2026-02-10 5.3 Medium
Windows iSCSI Service Denial of Service Vulnerability
CVE-2024-35264 2 Microsoft, Redhat 4 .net, Visual Studio, Visual Studio 2022 and 1 more 2026-02-10 8.1 High
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2024-30081 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2026-02-10 7.1 High
Windows NTLM Spoofing Vulnerability
CVE-2024-28899 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2026-02-10 8.8 High
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-21417 1 Microsoft 15 Windows 10 1809, Windows 10 21h2, Windows 10 21h2 and 12 more 2026-02-10 8.8 High
Windows Text Services Framework Elevation of Privilege Vulnerability
CVE-2026-25872 2026-02-10 5.3 Medium
JUNG Smart Panel KNX firmware version L1.12.22 and prior contain an unauthenticated path traversal vulnerability in the embedded web interface. The application fails to properly validate file path input, allowing remote, unauthenticated attackers to access arbitrary files on the underlying filesystem within the context of the web server. This may result in disclosure of system configuration files and other sensitive information.
CVE-2026-25870 2026-02-10 5.8 Medium
DoraCMS version 3.1 and prior contains a server-side request forgery (SSRF) vulnerability in its UEditor remote image fetch functionality. The application accepts user-supplied URLs and performs server-side HTTP or HTTPS requests without sufficient validation or destination restrictions. The implementation does not enforce allowlists, block internal or private IP address ranges, or apply request timeouts or response size limits. An attacker can abuse this behavior to induce the server to issue outbound requests to arbitrary hosts, including internal network resources, potentially enabling internal network scanning and denial of service through resource exhaustion.