CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 8533 CVEs

CVE ID Severity Description EPSS Published
8.8 HIGH

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to run arbitrary commands via the user interface. This user interface can be used via the network and allows the execution of commands as administrative application user.

0.1% 2025-11-11
7.8 HIGH

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to extraction of database credentials via a world-readable credential file. This allows an attacker to connect to the database as privileged application user and to run system commands via the database.

0.0% 2025-11-11
7.8 HIGH

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to a local privilege escalation due to wrongly set permissions to a binary which allows any local attacker to gain administrative privileges.

0.0% 2025-11-11
7.8 HIGH

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to a local privilege escalation due to an exposed debug interface on the localhost. This allows any local user to gain code execution as administrative application user.

0.0% 2025-11-11
7.8 HIGH

Format Plugins versions 1.1.1 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Format Plugins versions 1.1.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Format Plugins versions 1.1.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.1 HIGH

Adobe Pass versions 3.7.3 and earlier are affected by an Incorrect Authorization vulnerability. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read and write access. Exploitation of this issue requires user interaction in that a victim must install a malicious SDK.

0.0% 2025-11-11
8.0 HIGH

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

0.1% 2025-11-11
8.8 HIGH

Improper neutralization of special elements used in a command ('command injection') in Visual Studio Code CoPilot Chat Extension allows an unauthorized attacker to execute code over a network.

0.2% 2025-11-11
8.8 HIGH

Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network.

0.1% 2025-11-11
7.0 HIGH

Double free in Microsoft Wireless Provisioning System allows an authorized attacker to elevate privileges locally.

0.0% 2025-11-11
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Wireless Provisioning System allows an authorized attacker to elevate privileges locally.

0.0% 2025-11-11
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2025-11-11
7.8 HIGH

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally.

0.8% 2025-11-11
7.0 HIGH

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
8.7 HIGH

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

0.1% 2025-11-11
8.7 HIGH

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

0.1% 2025-11-11
7.8 HIGH

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
8.0 HIGH

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

1.5% 2025-11-11
7.8 HIGH

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.1 HIGH

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

0.1% 2025-11-11
7.8 HIGH

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.8 HIGH

Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.8 HIGH

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

0.5% 2025-11-11
7.8 HIGH

Illustrator on iPad versions 3.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator versions 28.7.10, 29.8.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator on iPad versions 3.0.9 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator on iPad versions 3.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Illustrator versions 28.7.10, 29.8.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Photoshop Desktop versions 26.8.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2025-11-11
7.8 HIGH

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.1 HIGH

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

0.1% 2025-11-11
7.8 HIGH

Privilege context switching error in Windows Administrator Protection allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.0 HIGH

Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Untrusted search path in Windows Administrator Protection allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.0 HIGH

Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.0 HIGH

Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
8.0 HIGH

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

0.1% 2025-11-11
7.8 HIGH

Heap-based buffer overflow in Windows OLE allows an unauthorized attacker to execute code locally.

0.1% 2025-11-11
7.8 HIGH

Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.

0.3% 2025-11-11
7.8 HIGH

Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Use after free in Multimedia Class Scheduler Service (MMCSS) allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.8 HIGH

Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally.

0.1% 2025-11-11
7.5 HIGH

Missing cryptographic step in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.

0.0% 2025-11-11