Search

Search Results (332215 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-1571 2026-02-11 N/A
User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.
CVE-2026-20846 1 Microsoft 15 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 12 more 2026-02-11 7.5 High
Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network.
CVE-2026-21222 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 9 more 2026-02-11 5.5 Medium
Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally.
CVE-2026-21243 1 Microsoft 4 Windows Server 2019, Windows Server 2022, Windows Server 2025 and 1 more 2026-02-11 7.5 High
Null pointer dereference in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
CVE-2026-21249 1 Microsoft 14 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 11 more 2026-02-11 3.3 Low
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing locally.
CVE-2026-21261 1 Microsoft 7 365 Apps, Excel 2016, Office 2019 and 4 more 2026-02-11 5.5 Medium
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
CVE-2026-21511 1 Microsoft 10 365 Apps, Office 2019, Office 2021 and 7 more 2026-02-11 7.5 High
Deserialization of untrusted data in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-21529 1 Microsoft 1 Azure Hdinsights 2026-02-11 5.7 Medium
Improper neutralization of input during web page generation ('cross-site scripting') in Azure HDInsights allows an authorized attacker to perform spoofing over a network.
CVE-2026-21528 1 Microsoft 1 Azure Iot Explorer 2026-02-11 6.5 Medium
Binding to an unrestricted ip address in Azure IoT SDK allows an unauthorized attacker to disclose information over a network.
CVE-2026-21527 1 Microsoft 3 Exchange Server 2016, Exchange Server 2019, Exchange Server Se 2026-02-11 6.5 Medium
User interface (ui) misrepresentation of critical information in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-21532 1 Microsoft 1 Azure Functions 2026-02-11 8.2 High
Azure Function Information Disclosure Vulnerability
CVE-2026-24302 1 Microsoft 1 Azure Arc 2026-02-11 8.6 High
Azure Arc Elevation of Privilege Vulnerability
CVE-2026-24300 1 Microsoft 1 Azure Front Door 2026-02-11 9.8 Critical
Azure Front Door Elevation of Privilege Vulnerability
CVE-2026-0391 1 Microsoft 1 Edge Chromium 2026-02-11 6.5 Medium
User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-23655 1 Microsoft 1 Microsoft Aci Confidential Containers 2026-02-11 6.5 Medium
Cleartext storage of sensitive information in Azure Compute Gallery allows an authorized attacker to disclose information over a network.
CVE-2026-21218 1 Microsoft 1 .net 2026-02-11 7.5 High
Improper handling of missing special element in .NET allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-21260 1 Microsoft 8 365 Apps, Office 2019, Office 2021 and 5 more 2026-02-11 7.5 High
Exposure of sensitive information to an unauthorized actor in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-21258 1 Microsoft 7 365 Apps, Excel 2016, Office 2019 and 4 more 2026-02-11 5.5 Medium
Improper input validation in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
CVE-2026-21512 1 Microsoft 1 Azure Devops Server 2022 2026-02-11 6.5 Medium
Server-side request forgery (ssrf) in Azure DevOps Server allows an authorized attacker to perform spoofing over a network.
CVE-2026-26007 2026-02-11 N/A
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to 46.0.5, the public_key_from_numbers (or EllipticCurvePublicNumbers.public_key()), EllipticCurvePublicNumbers.public_key(), load_der_public_key() and load_pem_public_key() functions do not verify that the point belongs to the expected prime-order subgroup of the curve. This missing validation allows an attacker to provide a public key point P from a small-order subgroup. This can lead to security issues in various situations, such as the most commonly used signature verification (ECDSA) and shared key negotiation (ECDH). When the victim computes the shared secret as S = [victim_private_key]P via ECDH, this leaks information about victim_private_key mod (small_subgroup_order). For curves with cofactor > 1, this reveals the least significant bits of the private key. When these weak public keys are used in ECDSA , it's easy to forge signatures on the small subgroup. Only SECT curves are impacted by this. This vulnerability is fixed in 46.0.5.