Search Results (4553 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-20642 1 Apple 3 Ios And Ipados, Ipados, Iphone Os 2026-02-18 2.4 Low
An input validation issue was addressed. This issue is fixed in iOS 26.3 and iPadOS 26.3. A person with physical access to an iOS device may be able to access photos from the lock screen.
CVE-2026-20603 1 Apple 1 Macos 2026-02-18 4.4 Medium
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Tahoe 26.3. An app with root privileges may be able to access private information.
CVE-2026-20628 1 Apple 7 Ios And Ipados, Ipados, Iphone Os and 4 more 2026-02-17 7.1 High
A permissions issue was addressed with additional restrictions. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.
CVE-2026-24055 1 Langfuse 1 Langfuse 2026-02-17 5.3 Medium
Langfuse is an open source large language model engineering platform. In versions 3.146.0 and below, the /api/public/slack/install endpoint initiates Slack OAuth using a projectId provided by the client without authentication or authorization. The projectId is preserved throughout the OAuth flow, and the callback stores installations based on this untrusted metadata. This allows an attacker to bind their Slack workspace to any project and potentially receive changes to prompts stored in Langfuse Prompt Management. An attacker can replace existing Prompt Slack Automation integrations or pre-register a malicious one, though the latter requires an authenticated user to unknowingly configure it despite visible workspace and channel indicators in the UI. This issue has been fixed in version 3.147.0.
CVE-2026-20601 1 Apple 1 Macos 2026-02-17 3.3 Low
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26.3. An app may be able to monitor keystrokes without user permission.
CVE-2025-69634 1 Dolibarr 1 Dolibarr 2026-02-14 9 Critical
Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php NOTE: this is disputed by a third party who indicates that exploitation can only occur if an unprivileged user knows the token of an admin user.
CVE-2025-64660 1 Microsoft 1 Visual Studio Code 2026-02-13 8 High
Improper access control in GitHub Copilot and Visual Studio Code allows an authorized attacker to execute code over a network.
CVE-2025-47179 1 Microsoft 4 Configuration Manager, Configuration Manager 2403, Configuration Manager 2409 and 1 more 2026-02-13 6.7 Medium
Improper access control in Microsoft Configuration Manager allows an authorized attacker to elevate privileges locally.
CVE-2025-60705 1 Microsoft 27 Windows, Windows 10, Windows 10 1607 and 24 more 2026-02-13 7.8 High
Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally.
CVE-2025-59512 1 Microsoft 24 Windows, Windows 10, Windows 10 1607 and 21 more 2026-02-13 7.8 High
Improper access control in Customer Experience Improvement Program (CEIP) allows an authorized attacker to elevate privileges locally.
CVE-2026-0653 1 Tp-link 3 Tapo C260, Tapo C260 Firmware, Tapo C260 V1 2026-02-13 6.5 Medium
On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
CVE-2025-21185 1 Microsoft 1 Edge Chromium 2026-02-13 6.5 Medium
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2025-21380 1 Microsoft 2 Azure Marketplace, Marketplace Saas 2026-02-13 8.8 High
Improper access control in Azure SaaS Resources allows an authorized attacker to disclose information over a network.
CVE-2025-21340 1 Microsoft 16 Windows 10 1809, Windows 10 21h2, Windows 10 21h2 and 13 more 2026-02-13 5.5 Medium
Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
CVE-2025-21213 1 Microsoft 21 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 18 more 2026-02-13 4.6 Medium
Secure Boot Security Feature Bypass Vulnerability
CVE-2025-21202 1 Microsoft 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more 2026-02-13 6.1 Medium
Windows Recovery Environment Agent Elevation of Privilege Vulnerability
CVE-2025-21405 1 Microsoft 1 Visual Studio 2022 2026-02-13 7.3 High
Visual Studio Elevation of Privilege Vulnerability
CVE-2025-21301 1 Microsoft 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more 2026-02-13 6.5 Medium
Windows Geolocation Service Information Disclosure Vulnerability
CVE-2025-21293 1 Microsoft 21 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 18 more 2026-02-13 8.8 High
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2025-24989 1 Microsoft 1 Power Pages 2026-02-13 8.2 High
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you.