Search

Search Results (332186 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-26036 2026-02-11 N/A
Not used
CVE-2026-26037 2026-02-11 N/A
Not used
CVE-2026-26038 2026-02-11 N/A
Not used
CVE-2026-26039 2026-02-11 N/A
Not used
CVE-2026-26040 2026-02-11 N/A
Not used
CVE-2026-26041 2026-02-11 N/A
Not used
CVE-2026-26042 2026-02-11 N/A
Not used
CVE-2026-26043 2026-02-11 N/A
Not used
CVE-2026-26044 2026-02-11 N/A
Not used
CVE-2026-21517 1 Microsoft 1 Windows App For Mac 2026-02-11 4.7 Medium
Improper link resolution before file access ('link following') in Windows App for Mac allows an authorized attacker to elevate privileges locally.
CVE-2026-1231 2026-02-11 6.4 Medium
The Beaver Builder Page Builder – Drag and Drop Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `js` Global Settings parameter in all versions up to, and including, 2.10.0.5 due to missing capability checks on save_global_settings() function and insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Custom-level access and above who have been granted beaver builder access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2025-15524 2026-02-11 4.3 Medium
The Gallery by FooGallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax_get_gallery_info() function in all versions up to, and including, 3.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve metadata (name, image count, thumbnail URL) of private, draft, and password-protected galleries by enumerating gallery IDs.
CVE-2025-14541 2026-02-11 7.2 High
The Lucky Wheel Giveaway plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.22 via the conditional_tags parameter. This is due to the plugin using PHP's eval() function on user-controlled input without proper validation or sanitization. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
CVE-2025-13431 2026-02-11 6.5 Medium
The SlimStat Analytics plugin for WordPress is vulnerable to time-based SQL Injection via the ‘args’ parameter in all versions up to, and including, 5.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CVE-2026-1571 2026-02-11 N/A
User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.
CVE-2026-20841 1 Microsoft 1 Window Notepad 2026-02-11 8.8 High
Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network.
CVE-2026-20846 1 Microsoft 15 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 12 more 2026-02-11 7.5 High
Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network.
CVE-2026-21222 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 9 more 2026-02-11 5.5 Medium
Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally.
CVE-2026-21228 1 Microsoft 1 Azure Local 2026-02-11 8.1 High
Improper certificate validation in Azure Local allows an unauthorized attacker to execute code over a network.
CVE-2026-21231 1 Microsoft 15 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 12 more 2026-02-11 7.8 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally.