Search and browse vulnerability records from NVD
Showing 50 of 14948 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
| 7.8 HIGH |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
|
CVE-2025-62215
KEV
|
7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally. |
0.6% | 2025-11-11 | |
| 7.0 HIGH |
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 8.7 HIGH |
Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network. |
0.1% | 2025-11-11 | ||
| 8.7 HIGH |
Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 8.0 HIGH |
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
3.0% | 2025-11-11 | ||
| 7.8 HIGH |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 7.1 HIGH |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
0.9% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator on iPad versions 3.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator versions 28.7.10, 29.8.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator on iPad versions 3.0.9 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator on iPad versions 3.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator versions 28.7.10, 29.8.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Photoshop Desktop versions 26.8.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 7.1 HIGH |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Privilege context switching error in Windows Administrator Protection allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.0 HIGH |
Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Untrusted search path in Windows Administrator Protection allows an authorized attacker to elevate privileges locally. |
0.2% | 2025-11-11 | ||
| 7.0 HIGH |
Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.0 HIGH |
Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 8.0 HIGH |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Heap-based buffer overflow in Windows OLE allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally. |
0.3% | 2025-11-11 | ||
| 7.8 HIGH |
Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Use after free in Multimedia Class Scheduler Service (MMCSS) allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.5 HIGH |
Missing cryptographic step in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Untrusted pointer dereference in Windows Remote Desktop allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.0 HIGH |
Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Improper privilege management in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Improper access control in Customer Experience Improvement Program (CEIP) allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
External control of file name or path in Windows WLAN Service allows an authorized attacker to elevate privileges locally. |
0.2% | 2025-11-11 | ||
| 7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Speech allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Speech allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Double free in Windows Smart Card allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.3 HIGH |
Heap-based buffer overflow in Azure Monitor Agent allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 8.8 HIGH |
Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network. |
0.2% | 2025-11-11 | ||
| 8.1 HIGH |
Missing authorization in Nuance PowerScribe allows an unauthorized attacker to disclose information over a network. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
InDesign Desktop versions 20.5, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 |