Search and browse vulnerability records from NVD
Showing 50 of 46071 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
| 6.5 MEDIUM |
Binding to an unrestricted ip address in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network. |
0.1% | 2026-02-10 | ||
| 6.5 MEDIUM |
User interface (ui) misrepresentation of critical information in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. |
0.1% | 2026-02-10 | ||
|
CVE-2026-21525
KEV
|
6.2 MEDIUM |
Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. |
4.2% | 2026-02-10 | |
| 8.0 HIGH |
Time-of-check time-of-use (toctou) race condition in GitHub Copilot and Visual Studio allows an authorized attacker to execute code over a network. |
0.0% | 2026-02-10 | ||
| 6.7 MEDIUM |
Improper neutralization of special elements used in a command ('command injection') in Azure Compute Gallery allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-02-10 | ||
|
CVE-2026-21519
KEV
|
7.8 HIGH |
Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally. |
4.7% | 2026-02-10 | |
| 8.8 HIGH |
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio Code allows an unauthorized attacker to bypass a security feature over a network. |
0.0% | 2026-02-10 | ||
| 4.7 MEDIUM |
Improper link resolution before file access ('link following') in Windows App for Mac allows an authorized attacker to elevate privileges locally. |
0.0% | 2026-02-10 | ||
| 8.8 HIGH |
Improper neutralization of special elements used in a command ('command injection') in Github Copilot allows an unauthorized attacker to execute code over a network. |
0.0% | 2026-02-10 | ||
|
CVE-2026-21514
KEV
|
7.8 HIGH |
Reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally. |
7.2% | 2026-02-10 | |
|
CVE-2026-21513
KEV
|
8.8 HIGH |
Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network. |
8.0% | 2026-02-10 | |
| 6.5 MEDIUM |
Server-side request forgery (ssrf) in Azure DevOps Server allows an authorized attacker to perform spoofing over a network. |
0.1% | 2026-02-10 | ||
| 7.5 HIGH |
Deserialization of untrusted data in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network. |
0.2% | 2026-02-10 | ||
|
CVE-2026-21510
KEV
|
8.8 HIGH |
Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network. |
2.9% | 2026-02-10 | |
| 7.0 HIGH |
Improper authentication in Windows Storage allows an authorized attacker to elevate privileges locally. |
0.1% | 2026-02-10 | ||
| 5.5 MEDIUM |
InDesign Desktop versions 21.1, 20.5.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
InDesign Desktop versions 21.1, 20.5.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
After Effects versions 25.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Substance3D - Designer versions 15.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Substance3D - Designer versions 15.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Substance3D - Designer versions 15.1.0 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Substance3D - Designer versions 15.1.0 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Substance3D - Designer versions 15.1.0 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
Substance3D - Designer versions 15.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
Substance3D - Designer versions 15.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
InDesign Desktop versions 21.1, 20.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by an Access of Resource Using Incompatible Type ('Type Confusion') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
After Effects versions 25.6 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
After Effects versions 25.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Audition versions 25.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Audition versions 25.3 and earlier are affected by an Access of Memory Location After End of Buffer vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to cause the application to crash or become unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Audition versions 25.3 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Audition versions 25.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Audition versions 25.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
Audition versions 25.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
0.0% | 2026-02-10 | ||
| 7.5 HIGH |
Exposure of sensitive information to an unauthorized actor in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network. |
0.0% | 2026-02-10 | ||
| 7.8 HIGH |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to elevate privileges locally. |
0.0% | 2026-02-10 | ||
| 5.5 MEDIUM |
Improper input validation in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
0.1% | 2026-02-10 |