Search

Search Results (332744 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-23856 1 Dell 1 Idrac Service Module 2026-02-13 7.8 High
Dell iDRAC Service Module (iSM) for Windows, versions prior to 6.0.3.1, and Dell iDRAC Service Module (iSM) for Linux, versions prior to 5.4.1.1, contain an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
CVE-2026-20615 1 Apple 3 Ios And Ipados, Macos, Visionos 2026-02-13 N/A
A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to gain root privileges.
CVE-2026-20614 1 Apple 1 Macos 2026-02-13 N/A
A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to gain root privileges.
CVE-2026-20617 1 Apple 5 Ios And Ipados, Macos, Tvos and 2 more 2026-02-13 N/A
A race condition was addressed with improved state handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to gain root privileges.
CVE-2026-20626 1 Apple 5 Ios And Ipados, Ipados, Iphone Os and 2 more 2026-02-13 7.8 High
This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, visionOS 26.3. A malicious app may be able to gain root privileges.
CVE-2026-23857 1 Dell 1 Update Package 2026-02-13 8.2 High
Dell Update Package (DUP) Framework, versions 23.12.00 through 24.12.00, contains an Improper Handling of Insufficient Permissions or Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
CVE-2026-2004 2026-02-13 8.8 High
Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
CVE-2026-2005 2026-02-13 8.8 High
Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
CVE-2026-2006 2026-02-13 8.8 High
Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
CVE-2025-41117 1 Grafana 2 Grafana, Grafana Enterprise 2026-02-13 6.8 Medium
Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field. Only datasources with the Jaeger HTTP API appear to be affected; Jaeger gRPC and Tempo do not appear affected whatsoever.
CVE-2026-26257 2026-02-13 N/A
Not used
CVE-2026-26256 2026-02-13 N/A
Not used
CVE-2026-26255 2026-02-13 N/A
Not used
CVE-2026-26254 2026-02-13 N/A
Not used
CVE-2026-26253 2026-02-13 N/A
Not used
CVE-2026-26252 2026-02-13 N/A
Not used
CVE-2026-26251 2026-02-13 N/A
Not used
CVE-2026-26250 2026-02-13 N/A
Not used
CVE-2026-26249 2026-02-13 N/A
Not used
CVE-2026-20663 1 Apple 3 Ios And Ipados, Ipados, Iphone Os 2026-02-12 3.3 Low
The issue was resolved by sanitizing logging. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An app may be able to enumerate a user's installed apps.