CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 14948 CVEs

CVE ID Severity Description EPSS Published
7.8 HIGH

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally.

0.6% 2025-11-11
7.0 HIGH

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
8.7 HIGH

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

0.1% 2025-11-11
8.7 HIGH

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

0.1% 2025-11-11
7.8 HIGH

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
8.0 HIGH

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

3.0% 2025-11-11
7.8 HIGH

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.1 HIGH

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

0.1% 2025-11-11
7.8 HIGH

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.8 HIGH

Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.8 HIGH

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

0.9% 2025-11-11
7.8 HIGH

Illustrator on iPad versions 3.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator versions 28.7.10, 29.8.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator on iPad versions 3.0.9 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator on iPad versions 3.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator versions 28.7.10, 29.8.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Photoshop Desktop versions 26.8.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.1 HIGH

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

0.1% 2025-11-11
7.8 HIGH

Privilege context switching error in Windows Administrator Protection allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.0 HIGH

Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Untrusted search path in Windows Administrator Protection allows an authorized attacker to elevate privileges locally.

0.2% 2025-11-11
7.0 HIGH

Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.0 HIGH

Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
8.0 HIGH

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

0.1% 2025-11-11
7.8 HIGH

Heap-based buffer overflow in Windows OLE allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.8 HIGH

Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.

0.3% 2025-11-11
7.8 HIGH

Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Use after free in Multimedia Class Scheduler Service (MMCSS) allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.5 HIGH

Missing cryptographic step in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.

0.1% 2025-11-11
7.8 HIGH

Untrusted pointer dereference in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.0 HIGH

Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Improper privilege management in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Improper access control in Customer Experience Improvement Program (CEIP) allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

External control of file name or path in Windows WLAN Service allows an authorized attacker to elevate privileges locally.

0.2% 2025-11-11
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Speech allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Speech allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Double free in Windows Smart Card allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.3 HIGH

Heap-based buffer overflow in Azure Monitor Agent allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
8.8 HIGH

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.

0.2% 2025-11-11
8.1 HIGH

Missing authorization in Nuance PowerScribe allows an unauthorized attacker to disclose information over a network.

0.1% 2025-11-11
7.8 HIGH

InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11