Search Results (17717 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-21216 1 Microsoft 18 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 15 more 2026-02-13 6.5 Medium
Internet Connection Sharing (ICS) Denial of Service Vulnerability
CVE-2025-21212 1 Microsoft 18 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 15 more 2026-02-13 6.5 Medium
Internet Connection Sharing (ICS) Denial of Service Vulnerability
CVE-2025-21184 1 Microsoft 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more 2026-02-13 7 High
Windows Core Messaging Elevation of Privileges Vulnerability
CVE-2025-21181 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 7.5 High
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVE-2025-21179 1 Microsoft 3 Windows 11 24h2, Windows 11 24h2, Windows Server 2025 2026-02-13 4.8 Medium
DHCP Client Service Denial of Service Vulnerability
CVE-2025-21377 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 6.5 Medium
NTLM Hash Disclosure Spoofing Vulnerability
CVE-2025-21358 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2026-02-13 7.8 High
Windows Core Messaging Elevation of Privileges Vulnerability
CVE-2025-21350 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 5.9 Medium
Windows Kerberos Denial of Service Vulnerability
CVE-2025-21347 1 Microsoft 21 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 18 more 2026-02-13 6 Medium
Windows Deployment Services Denial of Service Vulnerability
CVE-2025-21337 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 3.3 Low
Windows NTFS Elevation of Privilege Vulnerability
CVE-2025-21194 1 Microsoft 63 Surface Go 2, Surface Go 2 1901, Surface Go 2 1901 Firmware and 60 more 2026-02-13 7.1 High
Microsoft Surface Security Feature Bypass Vulnerability
CVE-2025-21420 1 Microsoft 21 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 18 more 2026-02-13 7.8 High
Windows Disk Cleanup Tool Elevation of Privilege Vulnerability
CVE-2025-21379 1 Microsoft 3 Windows 11 24h2, Windows 11 24h2, Windows Server 2025 2026-02-13 7.1 High
DHCP Client Service Remote Code Execution Vulnerability
CVE-2025-21375 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 7.8 High
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2025-21369 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 8.8 High
Microsoft Digest Authentication Remote Code Execution Vulnerability
CVE-2025-21368 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-13 8.8 High
Microsoft Digest Authentication Remote Code Execution Vulnerability
CVE-2025-21352 1 Microsoft 17 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 14 more 2026-02-13 6.5 Medium
Internet Connection Sharing (ICS) Denial of Service Vulnerability
CVE-2025-21351 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 9 more 2026-02-13 7.5 High
Windows Active Directory Domain Services API Denial of Service Vulnerability
CVE-2024-25709 3 Esri, Linux, Microsoft 3 Portal For Arcgis, Linux Kernel, Windows 2026-02-13 6.1 Medium
There is a stored Cross‑Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS versions 11.2 and below that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item, which could potentially execute arbitrary JavaScript code in a victim’s browser. Exploitation does not require any privileges and can be performed by an anonymous user.
CVE-2024-25705 3 Esri, Linux, Microsoft 3 Portal For Arcgis, Linux Kernel, Windows 2026-02-13 5.4 Medium
There is a cross‑site scripting (XSS) vulnerability in Esri Portal for ArcGIS Experience Builder versions 11.1 and below on Windows and Linux that allows a remote, authenticated attacker with low‑privileged access to create a crafted link which, when clicked, could potentially execute arbitrary JavaScript code in the victim’s browser. Exploitation requires basic authenticated access but does not require elevated or administrative privileges, indicating low privileges are required.