Search and browse vulnerability records from NVD
Showing 50 of 55834 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
| 7.8 HIGH |
Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability |
0.0% | 2026-01-13 | ||
| 7.8 HIGH |
Time-of-check time-of-use (toctou) race condition in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 5.5 MEDIUM |
Out-of-bounds read in Windows TPM allows an authorized attacker to disclose information locally. |
0.0% | 2026-01-13 | ||
| 4.6 MEDIUM |
Out-of-bounds read in Windows Internet Connection Sharing (ICS) allows an unauthorized attacker to disclose information with a physical attack. |
0.0% | 2026-01-13 | ||
| 5.5 MEDIUM |
Exposure of sensitive information to an unauthorized actor in Tablet Windows User Interface (TWINUI) Subsystem allows an authorized attacker to disclose information locally. |
0.0% | 2026-01-13 | ||
| 7.8 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Tablet Windows User Interface (TWINUI) Subsystem allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 4.4 MEDIUM |
Improper access control in Windows Hyper-V allows an authorized attacker to disclose information locally. |
0.0% | 2026-01-13 | ||
| 5.5 MEDIUM |
Protection mechanism failure in Windows Remote Assistance allows an unauthorized attacker to bypass a security feature locally. |
0.0% | 2026-01-13 | ||
| 5.5 MEDIUM |
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally. |
0.0% | 2026-01-13 | ||
| 7.8 HIGH |
Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 6.2 MEDIUM |
Exposure of sensitive information to an unauthorized actor in Windows Remote Procedure Call allows an unauthorized attacker to disclose information locally. |
0.0% | 2026-01-13 | ||
| 7.8 HIGH |
Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 5.5 MEDIUM |
Untrusted pointer dereference in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to disclose information locally. |
0.0% | 2026-01-13 | ||
| 6.2 MEDIUM |
Insertion of sensitive information into log file in Windows Kernel allows an unauthorized attacker to disclose information locally. |
0.0% | 2026-01-13 | ||
| 7.8 HIGH |
Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 7.8 HIGH |
Time-of-check time-of-use (toctou) race condition in Windows Installer allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 6.5 MEDIUM |
Improper input validation in Windows LDAP - Lightweight Directory Access Protocol allows an authorized attacker to perform tampering over a network. |
0.1% | 2026-01-13 | ||
| 7.8 HIGH |
Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally. |
0.1% | 2026-01-13 | ||
| 7.8 HIGH |
Free of memory not on the heap in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 7.8 HIGH |
Time-of-check time-of-use (toctou) race condition in Windows Kernel Memory allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
| 7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Printer Association Object allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-01-13 | ||
|
CVE-2026-20805
KEV
|
5.5 MEDIUM |
Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally. |
3.7% | 2026-01-13 | |
| 7.7 HIGH |
Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally. |
0.0% | 2026-01-13 | ||
| 7.2 HIGH |
Missing authentication for critical function in SQL Server allows an authorized attacker to elevate privileges over a network. |
0.1% | 2026-01-13 | ||
| 7.5 HIGH |
Improper access control in Windows Deployment Services allows an unauthorized attacker to execute code over an adjacent network. |
0.1% | 2026-01-13 | ||
| 7.5 HIGH |
A vulnerability affecting HPE Networking Instant On Access Points has been identified where a device processing a specially crafted packet could enter a non-responsive state, in some cases requiring a hard reset to re-establish services. A malicious actor could leverage this vulnerability to conduct a Denial-of-Service attack on a target network. |
0.0% | 2026-01-13 | ||
| 7.5 HIGH |
A vulnerability in the router mode configuration of HPE Instant On Access Points exposed certain network configuration details to unintended interfaces. A malicious actor could gain knowledge of internal network configuration details through inspecting impacted packets. |
0.0% | 2026-01-13 | ||
| 7.8 HIGH |
Software installed and run as a non-privileged user may conduct improper GPU system calls to cause mismanagement of reference counting to cause a potential use after free. Improper reference counting on an internal resource caused scenario where potential for use after free was present. |
0.0% | 2026-01-13 | ||
| 6.2 MEDIUM |
Null pointer dereference in the MsgRegisterEvent() system call could allow an attacker with local access and code execution abilities to crash the QNX Neutrino kernel. |
0.0% | 2026-01-13 | ||
| 8.8 HIGH |
An authentication bypass vulnerability in the Tongyu AX1800 Wi-Fi 6 Router with firmware 1.0.0 allows unauthenticated network-adjacent attackers to perform arbitrary configuration changes without providing credentials, as long as a valid admin session is active. This can result in full compromise of the device (i.e., via unauthenticated access to /boaform/formSaveConfig and /boaform/admin endpoints). |
0.2% | 2026-01-13 | ||
| 3.8 LOW |
A Server-Side Request Forgery (SSRF) vulnerability [CWE-918] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.4, FortiSandbox 4.4 all versions, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions may allow an authenticated attacker to proxy internal requests limited to plaintext endpoints only via crafted HTTP requests. |
0.0% | 2026-01-13 | ||
| 6.5 MEDIUM |
Insecure permissions in Hubert Imoveis e Administracao Ltda Hub v2.0 1.27.3 allows authenticated attackers with low-level privileges to access other users' information via a crafted API request. |
0.0% | 2026-01-13 | ||
| 9.8 CRITICAL |
An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests. |
0.1% | 2026-01-13 | ||
| N/A |
Pega Customer Service Framework versions 8.7.0 through 25.1.0 are affected by a Unrestricted file upload vulnerability, where a privileged user could potentially upload a malicious file. |
0.1% | 2026-01-13 | ||
| 7.2 HIGH |
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiClientEMS 7.4.3 through 7.4.4, FortiClientEMS 7.4.0 through 7.4.1, FortiClientEMS 7.2.0 through 7.2.10, FortiClientEMS 7.0 all versions may allow an authenticated attacker with at least read-only admin permission to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests. |
0.1% | 2026-01-13 | ||
| 6.5 MEDIUM |
An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 allows a privileged attacker to delete files from the underlying filesystem via crafted HTTP or HTTPs requests. |
0.2% | 2026-01-13 | ||
| 8.8 HIGH |
Software installed and run as a non-privileged user may conduct improper GPU system calls to cause mismanagement of resources reference counting creating a potential use after free scenario. Improper resource management and reference counting on an internal resource caused scenario where potential write use after free was present. |
0.0% | 2026-01-13 | ||
| 3.5 LOW |
Software installed and run as a non-privileged user may conduct improper GPU system calls to subvert GPU HW to write to arbitrary physical memory pages. Under certain circumstances this exploit could be used to corrupt data pages not allocated by the GPU driver but memory pages in use by the kernel and drivers running on the platform altering their behaviour. This attack can lead the GPU to perform write operations on restricted internal GPU buffers that can lead to a second order affect of corrupted arbitrary physical memory. |
0.0% | 2026-01-13 | ||
| 9.8 CRITICAL |
An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in Fortinet FortiFone 7.0.0 through 7.0.1, FortiFone 3.0.13 through 3.0.23 allows an unauthenticated attacker to obtain the device configuration via crafted HTTP or HTTPS requests. |
1.2% | 2026-01-13 | ||
| 7.5 HIGH |
Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a Creation of Temporary File With Insecure Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. |
0.0% | 2026-01-13 | ||
| 6.6 MEDIUM |
Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a Creation of Temporary File With Insecure Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information Tampering. |
0.0% | 2026-01-13 | ||
| 7.5 HIGH |
In Eptura Archibus 2024.03.01.109, the "Run script" and "Server File" components of the "Database Update Wizard" are vulnerable to directory traversal. |
0.8% | 2026-01-13 | ||
| 8.1 HIGH |
A heap-based buffer overflow vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiOS 6.4 all versions, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows attacker to execute unauthorized code or commands via specially crafted packets |
0.0% | 2026-01-13 | ||
| 9.1 CRITICAL |
Intermediate register values of secure workloads can be exfiltrated in workloads scheduled from applications running in the non-secure environment of a platform. |
0.0% | 2026-01-13 | ||
| 8.0 HIGH |
A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router GUI. |
0.1% | 2026-01-13 | ||
| 8.0 HIGH |
An insufficient authentication vulnerability in NETGEAR WiFi range extenders allows a network adjacent attacker with WiFi authentication or a physical Ethernet port connection to bypass the authentication process and access the admin panel. |
0.1% | 2026-01-13 | ||
| 8.0 HIGH |
An insufficient input validation vulnerability in the NETGEAR XR1000v2 allows attackers connected to the router's LAN to execute OS command injections. |
0.0% | 2026-01-13 |