Export limit exceeded: 20456 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 334991 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (334991 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-26723 2 Key Systems, Keystorage 2 Global Facilities Management Software, Global Facilities Management Software 2026-02-26 8.2 High
Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the function parameter.
CVE-2025-1789 1 Genetec 2 Genetec Update Service, Update Service 2026-02-26 7.8 High
Local privilege escalation in Genetec Update Service. An authenticated, low-privileged, Windows user could exploit this vulnerability to gain elevated privileges on the affected system.
CVE-2026-26724 2 Key Systems, Keystorage 2 Global Facilities Management Software, Global Facilities Management Software 2026-02-26 7.6 High
Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the selectgroup and gn parameters on the /?Function=Groups endpoint.
CVE-2026-26937 2026-02-26 6.5 Medium
Uncontrolled Resource Consumption (CWE-400) in the Timelion component in Kibana can lead Denial of Service via Input Data Manipulation (CAPEC-153)
CVE-2025-20278 1 Cisco 8 Finesse, Socialminer, Unified Communications Manager and 5 more 2026-02-26 6 Medium
A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. This vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials.
CVE-2025-49714 1 Microsoft 2 Python, Visual Studio Code 2026-02-26 7.8 High
Trust boundary violation in Visual Studio Code - Python extension allows an unauthorized attacker to execute code locally.
CVE-2025-47827 2 Igel, Microsoft 16 Igel Os, Windows 10 1507, Windows 10 1607 and 13 more 2026-02-26 4.6 Medium
In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.
CVE-2025-49727 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-26 7 High
Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
CVE-2025-43026 1 Hp 1 Support Assistant 2026-02-26 7.8 High
A potential security vulnerability has been identified in the HP Support Assistant for versions prior to 9.44.18.0. The vulnerability could potentially allow a local attacker to escalate privileges via an arbitrary file write.
CVE-2025-49729 1 Microsoft 11 Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 Sp2 and 8 more 2026-02-26 8.8 High
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
CVE-2025-47966 1 Microsoft 2 Power Automate, Power Automate For Desktop 2026-02-26 9.8 Critical
Exposure of sensitive information to an unauthorized actor in Power Automate allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-49733 1 Microsoft 19 Windows, Windows 10, Windows 10 1809 and 16 more 2026-02-26 7.8 High
Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
CVE-2025-22481 1 Qnap 2 Qts, Quts Hero 2026-02-26 8.8 High
A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to execute arbitrary commands. We have already fixed the vulnerability in the following versions: QTS 5.2.4.3079 build 20250321 and later QuTS hero h5.2.4.3079 build 20250321 and later
CVE-2025-49737 1 Microsoft 2 Teams, Teams For Mac 2026-02-26 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Teams allows an authorized attacker to elevate privileges locally.
CVE-2025-3835 1 Zohocorp 1 Manageengine Exchange Reporter Plus 2026-02-26 9.6 Critical
Zohocorp ManageEngine Exchange Reporter Plus versions 5721 and prior are vulnerable to Remote code execution in the Content Search module.
CVE-2025-49738 1 Microsoft 1 Pc Manager 2026-02-26 7.8 High
Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.
CVE-2025-42982 2026-02-26 8.8 High
SAP GRC allows a non-administrative user to access and initiate transaction which could allow them to modify or control the transmitted system credentials. This causes high impact on confidentiality, integrity and availability of the application.
CVE-2025-49739 1 Microsoft 5 Visual Studio, Visual Studio 2015, Visual Studio 2017 and 2 more 2026-02-26 8.8 High
Improper link resolution before file access ('link following') in Visual Studio allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-42989 1 Sap 1 Netweaver Application Server For Abap 2026-02-26 9.6 Critical
RFC inbound processing�does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation the attacker could critically impact both integrity and availability of the application.
CVE-2025-49744 1 Microsoft 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more 2026-02-26 7 High
Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.