Search

Search Results (332771 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-24039 1 Microsoft 1 Visual Studio Code 2026-02-13 7.3 High
Visual Studio Code Elevation of Privilege Vulnerability
CVE-2025-24036 1 Microsoft 1 Autoupdate 2026-02-13 7 High
Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
CVE-2025-21420 1 Microsoft 21 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 18 more 2026-02-13 7.8 High
Windows Disk Cleanup Tool Elevation of Privilege Vulnerability
CVE-2025-21419 1 Microsoft 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more 2026-02-13 7.1 High
Windows Setup Files Cleanup Elevation of Privilege Vulnerability
CVE-2025-21418 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 7.8 High
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2025-21391 1 Microsoft 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more 2026-02-13 7.1 High
Windows Storage Elevation of Privilege Vulnerability
CVE-2025-21183 1 Microsoft 3 Windows 11 24h2, Windows 11 24h2, Windows Server 2025 2026-02-13 7.4 High
Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVE-2025-21182 1 Microsoft 3 Windows 11 24h2, Windows 11 24h2, Windows Server 2025 2026-02-13 7.4 High
Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVE-2025-21383 1 Microsoft 10 365 Apps, Excel, Excel 2016 and 7 more 2026-02-13 7.8 High
Microsoft Excel Information Disclosure Vulnerability
CVE-2025-21379 1 Microsoft 3 Windows 11 24h2, Windows 11 24h2, Windows Server 2025 2026-02-13 7.1 High
DHCP Client Service Remote Code Execution Vulnerability
CVE-2025-21376 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 8.1 High
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVE-2025-21375 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 7.8 High
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2025-21369 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 8.8 High
Microsoft Digest Authentication Remote Code Execution Vulnerability
CVE-2025-21368 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 8.8 High
Microsoft Digest Authentication Remote Code Execution Vulnerability
CVE-2025-21352 1 Microsoft 17 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 14 more 2026-02-13 6.5 Medium
Internet Connection Sharing (ICS) Denial of Service Vulnerability
CVE-2025-21351 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 9 more 2026-02-13 7.5 High
Windows Active Directory Domain Services API Denial of Service Vulnerability
CVE-2025-21206 1 Microsoft 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 2026-02-13 7.3 High
Visual Studio Installer Elevation of Privilege Vulnerability
CVE-2025-21188 1 Microsoft 2 Azure Network Watcher, Azure Network Watcher Agent 2026-02-13 6 Medium
Azure Network Watcher VM Extension Elevation of Privilege Vulnerability
CVE-2026-1446 1 Esri 1 Arcgis Pro 2026-02-13 5 Medium
There is a Cross‑Site Scripting (XSS) issue in Esri ArcGIS Pro versions 3.6.0 and earlier. ArcGIS Pro is a desktop application, and exploitation is limited to local users interacting with the application; no privileged role or elevated permissions are required beyond standard local user access. A local attacker can supply malicious strings that may be rendered and executed when a specific dialog within ArcGIS Pro is opened. This issue is fixed in ArcGIS Pro version 3.6.1.
CVE-2025-67706 3 Esri, Linux, Microsoft 4 Arcgis Server, Linux, Linux Kernel and 1 more 2026-02-13 5.6 Medium
ArcGIS Server version 11.5 and earlier on Windows and Linux does not properly validate uploaded files, which allows remote attackers to upload arbitrary files. However, exploitation is constrained by server-side controls that prevent execution of uploaded content and do not allow modification of existing application files or system configurations. As a result, successful exploitation would have a low impact on confidentiality, integrity, and availability, and would not enable service disruption, privilege escalation, or unauthorized access to sensitive data.