Search

Search Results (333854 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-24039 1 Microsoft 1 Visual Studio Code 2026-02-13 7.3 High
Visual Studio Code Elevation of Privilege Vulnerability
CVE-2025-24036 1 Microsoft 1 Autoupdate 2026-02-13 7 High
Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
CVE-2025-21420 1 Microsoft 21 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 18 more 2026-02-13 7.8 High
Windows Disk Cleanup Tool Elevation of Privilege Vulnerability
CVE-2025-21419 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2026-02-13 7.1 High
Windows Setup Files Cleanup Elevation of Privilege Vulnerability
CVE-2025-21418 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 7.8 High
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2025-21391 1 Microsoft 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more 2026-02-13 7.1 High
Windows Storage Elevation of Privilege Vulnerability
CVE-2025-21183 1 Microsoft 3 Windows 11 24h2, Windows 11 24h2, Windows Server 2025 2026-02-13 7.4 High
Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVE-2025-21182 1 Microsoft 3 Windows 11 24h2, Windows 11 24h2, Windows Server 2025 2026-02-13 7.4 High
Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVE-2025-21383 1 Microsoft 10 365 Apps, Excel, Excel 2016 and 7 more 2026-02-13 7.8 High
Microsoft Excel Information Disclosure Vulnerability
CVE-2025-21379 1 Microsoft 3 Windows 11 24h2, Windows 11 24h2, Windows Server 2025 2026-02-13 7.1 High
DHCP Client Service Remote Code Execution Vulnerability
CVE-2025-21376 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 8.1 High
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVE-2025-21375 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 7.8 High
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2025-21369 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 8.8 High
Microsoft Digest Authentication Remote Code Execution Vulnerability
CVE-2025-21368 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 8.8 High
Microsoft Digest Authentication Remote Code Execution Vulnerability
CVE-2025-21352 1 Microsoft 17 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 14 more 2026-02-13 6.5 Medium
Internet Connection Sharing (ICS) Denial of Service Vulnerability
CVE-2025-21351 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 9 more 2026-02-13 7.5 High
Windows Active Directory Domain Services API Denial of Service Vulnerability
CVE-2025-21206 1 Microsoft 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 2026-02-13 7.3 High
Visual Studio Installer Elevation of Privilege Vulnerability
CVE-2025-21188 1 Microsoft 2 Azure Network Watcher, Azure Network Watcher Agent 2026-02-13 6 Medium
Azure Network Watcher VM Extension Elevation of Privilege Vulnerability
CVE-2026-1446 1 Esri 1 Arcgis Pro 2026-02-13 5 Medium
There is a Cross‑Site Scripting (XSS) issue in Esri ArcGIS Pro versions 3.6.0 and earlier. ArcGIS Pro is a desktop application, and exploitation is limited to local users interacting with the application; no privileged role or elevated permissions are required beyond standard local user access. A local attacker can supply malicious strings that may be rendered and executed when a specific dialog within ArcGIS Pro is opened. This issue is fixed in ArcGIS Pro version 3.6.1.
CVE-2024-51962 1 Esri 1 Arcgis Server 2026-02-13 8.7 High
A SQL injection vulnerability in ArcGIS Server allows an EDIT operation to modify column properties in a manner that could lead to SQL injection when performed by a remote authenticated user requiring elevated, non‑administrative privileges. Exploitation is restricted to users with advanced application‑specific permissions, indicating high privileges are required. Successful exploitation would have a high impact on integrity and confidentiality, with no impact on availability.