Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2026-20127
Known exploited
A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. 
CVSS Score
10.0
EPSS Score
0.313
Published
2026-02-25
CVE-2026-22769
Known exploited
Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible.
CVSS Score
10.0
EPSS Score
0.2
Published
2026-02-17
CVE-2026-2441
Known exploited
Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CVSS Score
8.8
EPSS Score
0.002
Published
2026-02-13
CVE-2026-25108
Known exploited
FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.
CVSS Score
8.8
EPSS Score
0.089
Published
2026-02-13
CVE-2026-20700
Known exploited
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, tvOS 26.3, visionOS 26.3, watchOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.
CVSS Score
7.8
EPSS Score
0.003
Published
2026-02-11
CVE-2026-21533
Known exploited
Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.
CVSS Score
7.8
EPSS Score
0.203
Published
2026-02-10
CVE-2026-21519
Known exploited
Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally.
CVSS Score
7.8
EPSS Score
0.052
Published
2026-02-10
CVE-2026-21525
Known exploited
Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.
CVSS Score
6.2
EPSS Score
0.134
Published
2026-02-10
CVE-2026-21510
Known exploited
Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
CVSS Score
8.8
EPSS Score
0.035
Published
2026-02-10
CVE-2026-21513
Known exploited
Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.
CVSS Score
8.8
EPSS Score
0.28
Published
2026-02-10


Contact Us

Shodan ® - All rights reserved