Vulnerability Database

322,388

Total vulnerabilities in the database

CVE-2026-1495

The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.

  • Published: Feb 10, 2026
  • Updated: Feb 11, 2026
  • CVE: CVE-2026-1495
  • Severity: Medium
  • Exploit:

CVSS v3:

  • Severity: Medium
  • Score: 6.5
  • AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

CWEs: