Search Results (75987 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-26064 2 Calibre-ebook, Kovidgoyal 2 Calibre, Calibre 2026-02-20 8.8 High
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Windows, this leads to Remote Code Execution by writing a payload to the Startup folder, which executes on next login. Function extract_pictures only checks startswith('Pictures'), and does not sanitize '..' sequences. calibre's own ZipFile.extractall() in utils/zipfile.py does sanitize '..' via _get_targetpath(), but extract_pictures() bypasses this by using manual zf.read() + open(). This issue has been fixed in version 9.3.0.
CVE-2025-65036 2 Xwiki, Xwikisas 2 Pro Macros, Xwiki-pro-macros 2026-02-20 8.3 High
XWiki Remote Macros provides XWiki rendering macros that are useful when migrating content from Confluence. Prior to 1.27.1, the macro executes Velocity from the details pages without checking for permissions, which can lead to remote code execution. This vulnerability is fixed in 1.27.1.
CVE-2026-26065 2 Calibre-ebook, Kovidgoyal 2 Calibre, Calibre 2026-02-20 8.8 High
calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting existing files. This can lead to potential code execution and Denial of Service through file corruption. This issue has been fixed in version 9.3.0.
CVE-2020-37100 2 Flexense, Syncbreeze 2 Syncbreeze, Sync Breeze 2026-02-20 7.8 High
Sync Breeze Enterprise 12.4.18 contains an unquoted service path vulnerability that allows local attackers to execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path by placing malicious executables in specific file system locations to hijack the service startup process.
CVE-2026-26990 1 Librenms 1 Librenms 2026-02-20 8.8 High
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below have a Time-Based Blind SQL Injection vulnerability in address-search.inc.php via the address parameter. When a crafted subnet prefix is supplied, the prefix value is concatenated directly into an SQL query without proper parameter binding, allowing an attacker to manipulate query logic and infer database information through time-based conditional responses. This vulnerability requires authentication and is exploitable by any authenticated user. This issue has been fixedd in version 26.2.0.
CVE-2025-47977 1 Microsoft 1 Nuance Digital Engagement Platform 2026-02-20 8.2 High
Improper neutralization of input during web page generation ('cross-site scripting') in Nuance Digital Engagement Platform allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-47959 1 Microsoft 2 Visual Studio, Visual Studio 2022 2026-02-20 7.1 High
Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an authorized attacker to execute code over a network.
CVE-2025-47174 1 Microsoft 8 365 Apps, Excel, Office and 5 more 2026-02-20 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-55322 1 Microsoft 1 Omniparser 2026-02-20 7.3 High
Binding to an unrestricted ip address in GitHub allows an unauthorized attacker to execute code over a network.
CVE-2025-55238 1 Microsoft 3 365, Dynamics 365, Dynamics 365 Fasttrack Implementation 2026-02-20 7.5 High
Dynamics 365 FastTrack Implementation Assets Information Disclosure Vulnerability
CVE-2025-47167 1 Microsoft 9 365 Apps, Office, Office 2016 and 6 more 2026-02-20 8.4 High
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-47164 1 Microsoft 9 365 Apps, Office, Office 2016 and 6 more 2026-02-20 8.4 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-55227 1 Microsoft 5 Sql Server, Sql Server 2016, Sql Server 2017 and 2 more 2026-02-20 8.8 High
Improper neutralization of special elements used in a command ('command injection') in SQL Server allows an authorized attacker to elevate privileges over a network.
CVE-2025-33068 1 Microsoft 6 Windows Server 2012, Windows Server 2012 R2, Windows Server 2016 and 3 more 2026-02-20 7.5 High
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
CVE-2025-54912 1 Microsoft 28 Bitlocker, Windows, Windows 10 and 25 more 2026-02-20 7.8 High
Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally.
CVE-2025-33056 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-20 7.5 High
Improper access control in Microsoft Local Security Authority Server (lsasrv) allows an unauthorized attacker to deny service over a network.
CVE-2025-54911 1 Microsoft 28 Bitlocker, Windows, Windows 10 and 25 more 2026-02-20 7.3 High
Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally.
CVE-2025-33050 1 Microsoft 7 Windows Server, Windows Server 2016, Windows Server 2019 and 4 more 2026-02-20 7.5 High
Protection mechanism failure in Windows DHCP Server allows an unauthorized attacker to deny service over a network.
CVE-2025-32725 1 Microsoft 7 Windows Server, Windows Server 2016, Windows Server 2019 and 4 more 2026-02-20 7.5 High
Protection mechanism failure in Windows DHCP Server allows an unauthorized attacker to deny service over a network.
CVE-2025-54116 1 Microsoft 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more 2026-02-20 7.3 High
Improper access control in Windows MultiPoint Services allows an authorized attacker to elevate privileges locally.