Search

Search Results (332747 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-20110 2026-02-13 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2025-20107 2026-02-13 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2025-20098 2026-02-13 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2025-20089 2026-02-13 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2025-20078 2026-02-13 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2025-20066 2026-02-13 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2025-20038 2026-02-13 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2025-20007 2026-02-13 N/A
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
CVE-2025-68458 2 Webpack, Webpack.js 2 Webpack, Webpack 2026-02-13 3.7 Low
Webpack is a module bundler. From version 5.49.0 to before 5.104.1, when experiments.buildHttp is enabled, webpack’s HTTP(S) resolver (HttpUriPlugin) can be bypassed to fetch resources from hosts outside allowedUris by using crafted URLs that include userinfo (username:password@host). If allowedUris enforcement relies on a raw string prefix check (e.g., uri.startsWith(allowed)), a URL that looks allow-listed can pass validation while the actual network request is sent to a different authority/host after URL parsing. This is a policy/allow-list bypass that enables build-time SSRF behavior (outbound requests from the build machine to internal-only endpoints, depending on network access) and untrusted content inclusion (the fetched response is treated as module source and bundled). This issue has been patched in version 5.104.1.
CVE-2026-20681 1 Apple 1 Macos 2026-02-13 3.3 Low
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Tahoe 26.3. An app may be able to access information about a user's contacts.
CVE-2025-47963 1 Microsoft 1 Edge Chromium 2026-02-13 6.3 Medium
No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-47964 1 Microsoft 2 Edge, Edge Chromium 2026-02-13 5.4 Medium
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVE-2025-47182 1 Microsoft 1 Edge Chromium 2026-02-13 5.6 Medium
Improper input validation in Microsoft Edge (Chromium-based) allows an authorized attacker to bypass a security feature locally.
CVE-2025-47977 1 Microsoft 1 Nuance Digital Engagement Platform 2026-02-13 8.2 High
Improper neutralization of input during web page generation ('cross-site scripting') in Nuance Digital Engagement Platform allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-47968 1 Microsoft 1 Autoupdate 2026-02-13 7.8 High
Improper input validation in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally.
CVE-2025-47959 1 Microsoft 2 Visual Studio, Visual Studio 2022 2026-02-13 7.1 High
Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an authorized attacker to execute code over a network.
CVE-2025-47176 1 Microsoft 5 365 Apps, Office, Office 2024 and 2 more 2026-02-13 7.8 High
'.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally.
CVE-2025-47175 1 Microsoft 11 365 Apps, Office, Office 2016 and 8 more 2026-02-13 7.8 High
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-47174 1 Microsoft 8 365 Apps, Excel, Office and 5 more 2026-02-13 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-47173 1 Microsoft 9 365 Apps, Office, Office 2016 and 6 more 2026-02-13 7.8 High
Improper input validation in Microsoft Office allows an unauthorized attacker to execute code locally.