Filtered by NVD-CWE-noinfo
Total 34599 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-21078 1 Samsung 1 Smart Switch 2026-02-26 8.8 High
Use of insufficiently random value of secretKey in Smart Switch prior to version 3.7.68.6 allows adjacent attackers to access backup data from applications.
CVE-2025-59249 1 Microsoft 6 Exchange, Exchange Server, Exchange Server 2016 and 3 more 2026-02-26 8.8 High
Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network.
CVE-2025-59250 1 Microsoft 10 Jdbc Driver For Sql Server, Jdbc Driver For Sql Server 10.2, Jdbc Driver For Sql Server 11.2 and 7 more 2026-02-26 8.1 High
Improper input validation in JDBC Driver for SQL Server allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-59494 1 Microsoft 2 Azure, Azure Monitor Agent 2026-02-26 7.8 High
Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
CVE-2025-25004 1 Microsoft 31 Powershell, Windows, Windows 10 and 28 more 2026-02-26 7.3 High
Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.
CVE-2025-43990 1 Dell 2 Command Monitor, Command|monitor 2026-02-26 7.3 High
Dell Command Monitor (DCM), versions prior to 10.12.3.28, contains an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
CVE-2025-10885 1 Autodesk 1 Installer 2026-02-26 7.8 High
A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation to NT AUTHORITY/SYSTEM due to an insufficient validation of loaded binaries. An attacker with local and low-privilege access could exploit this to execute code as SYSTEM.
CVE-2025-55692 1 Microsoft 27 Windows, Windows 10, Windows 10 1507 and 24 more 2026-02-26 7.8 High
Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally.
CVE-2025-55694 1 Microsoft 10 Windows, Windows 11, Windows 11 24h2 and 7 more 2026-02-26 7.8 High
Improper access control in Windows Error Reporting allows an authorized attacker to elevate privileges locally.
CVE-2025-12907 1 Google 1 Chrome 2026-02-26 8.8 High
Insufficient validation of untrusted input in Devtools in Google Chrome prior to 140.0.7339.80 allowed a remote attacker to execute arbitrary code via user action in Devtools. (Chromium security severity: Low)
CVE-2025-58726 1 Microsoft 30 Windows, Windows 10, Windows 10 1507 and 27 more 2026-02-26 7.5 High
Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
CVE-2025-12429 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-02-26 8.8 High
Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
CVE-2026-3131 1 Devolutions 2 Devolutions Server, Server 2026-02-26 6.5 Medium
Improper access control in multiple DVLS REST API endpoints in Devolutions Server 2025.3.14.0 and earlier allows an authenticated user with view-only permission to access sensitive connection data.
CVE-2026-22999 1 Linux 1 Linux Kernel 2026-02-26 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: do not free existing class in qfq_change_class() Fixes qfq_change_class() error case. cl->qdisc and cl should only be freed if a new class and qdisc were allocated, or we risk various UAF.
CVE-2026-22997 1 Linux 1 Linux Kernel 2026-02-26 5.5 Medium
In the Linux kernel, the following vulnerability has been resolved: net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts Since j1939_session_deactivate_activate_next() in j1939_tp_rxtimer() is called only when the timer is enabled, we need to call j1939_session_deactivate_activate_next() if we cancelled the timer. Otherwise, refcount for j1939_session leaks, which will later appear as | unregister_netdevice: waiting for vcan0 to become free. Usage count = 2. problem.
CVE-2025-53474 1 F5 22 Big-ip, Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager and 19 more 2026-02-26 7.5 High
When an iRule using an ILX::call command is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-58481 1 Samsung 2 Mobile, Motionphoto 2026-02-26 7.3 High
Improper access control in MPRemoteService of MotionPhoto prior to version 4.1.51 allows local attackers to start privileged service.
CVE-2025-58482 1 Samsung 2 Mobile, Motionphoto 2026-02-26 7.3 High
Improper access control in MPLocalService of MotionPhoto prior to version 4.1.51 allows local attackers to start privileged service.
CVE-2025-53856 1 F5 22 Big-ip, Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager and 19 more 2026-02-26 7.5 High
When a virtual server, network address translation (NAT) object, or secure network address translation (SNAT) object uses the embedded Packet Velocity Acceleration (ePVA) feature, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  To determine which BIG-IP platforms have an ePVA chip refer to K12837: Overview of the ePVA feature https://my.f5.com/manage/s/article/K12837 .  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-61951 1 F5 22 Big-ip, Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager and 19 more 2026-02-26 7.5 High
Undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  This issue may occur when a Datagram Transport Layer Security (DTLS) 1.2 virtual server is enabled with a Server SSL profile that is configured with a certificate, key, and the SSL Sign Hash set to ANY, and the backend server is enabled with DTLS 1.2 and client authentication.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.