Search Results (633 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-64656 1 Microsoft 2 Azure App Gateway, Azure Application Gateway 2026-02-26 9.4 Critical
Out-of-bounds read in Application Gateway allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-64657 1 Microsoft 2 Azure App Gateway, Azure Application Gateway 2026-02-26 9.8 Critical
Stack-based buffer overflow in Azure Application Gateway allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-64663 1 Microsoft 2 Azure Cognitive Service For Language, Azure Language 2026-02-26 9.9 Critical
Custom Question Answering Elevation of Privilege Vulnerability
CVE-2025-65041 1 Microsoft 1 Partner Center 2026-02-26 10 Critical
Improper authorization in Microsoft Partner Center allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-65037 1 Microsoft 1 Azure Container Apps 2026-02-26 10 Critical
Improper control of generation of code ('code injection') in Azure Container Apps allows an unauthorized attacker to execute code over a network.
CVE-2025-69258 2 Microsoft, Trendmicro 3 Windows, Apex Central, Apexcentral 2026-02-26 9.8 Critical
A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations.
CVE-2026-24305 1 Microsoft 2 Entra Id, Microsoft Entra Id 2026-02-26 9.3 Critical
Azure Entra ID Elevation of Privilege Vulnerability
CVE-2026-24307 1 Microsoft 1 365 Copilot 2026-02-26 9.3 Critical
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
CVE-2026-21264 1 Microsoft 2 Account, Micrososft Account 2026-02-26 9.3 Critical
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Account allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-24304 1 Microsoft 1 Azure Resource Manager 2026-02-26 9.9 Critical
Improper access control in Azure Resource Manager allows an authorized attacker to elevate privileges over a network.
CVE-2022-34882 3 Docker, Hitachi, Microsoft 3 Docker, Raid Manager Storage Replication Adapter, Windows 2026-02-25 9 Critical
Information Exposure Through an Error Message vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to gain sensitive information. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.
CVE-2020-1595 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2026-02-23 9.9 Critical
<p>A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user access a susceptible API on an affected version of SharePoint with specially-formatted input.</p> <p>The security update addresses the vulnerability by correcting how SharePoint handles deserialization of untrusted data.</p>
CVE-2020-1467 1 Microsoft 17 Windows 10, Windows 10 1607, Windows 10 1809 and 14 more 2026-02-23 10 Critical
An elevation of privilege vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows handles hard links.
CVE-2020-1210 1 Microsoft 4 Business Productivity Servers, Sharepoint Enterprise Server, Sharepoint Foundation and 1 more 2026-02-23 9.9 Critical
<p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.</p> <p>The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.</p>
CVE-2020-1025 1 Microsoft 7 Lync, Lync Server, Sharepoint Enterprise Server and 4 more 2026-02-23 9.8 Critical
An elevation of privilege vulnerability exists when Microsoft SharePoint Server and Skype for Business Server improperly handle OAuth token validation. An attacker who successfully exploited the vulnerability could bypass authentication and achieve improper access. To exploit this vulnerability, an attacker would need to modify the token. The update addresses the vulnerability by modifying how Microsoft SharePoint Server and Skype for Business Server validate tokens.
CVE-2025-55315 2 Microsoft, Redhat 4 Asp.net Core, Visual Studio, Visual Studio 2022 and 1 more 2026-02-22 9.9 Critical
Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.
CVE-2019-1226 1 Microsoft 9 Windows 10, Windows 10 1803, Windows 10 1809 and 6 more 2026-02-20 9.8 Critical
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
CVE-2019-1222 1 Microsoft 7 Windows 10, Windows 10 1803, Windows 10 1809 and 4 more 2026-02-20 9.8 Critical
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
CVE-2019-1213 1 Microsoft 2 Windows Server 2008, Windows Server 2008 Sp2 2026-02-20 9.8 Critical
A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server. To exploit the vulnerability, an attacker could send a specially crafted packet to a DHCP server. The security update addresses the vulnerability by correcting how DHCP servers handle network packets.
CVE-2019-1212 1 Microsoft 16 Windows 10, Windows 10 1607, Windows 10 1803 and 13 more 2026-02-20 9.8 Critical
A memory corruption vulnerability exists in the Windows Server DHCP service when processing specially crafted packets. An attacker who successfully exploited the vulnerability could cause the DHCP server service to stop responding. To exploit the vulnerability, a remote unauthenticated attacker could send a specially crafted packet to an affected DHCP server. The security update addresses the vulnerability by correcting how DHCP servers handle network packets.