Search and browse vulnerability records from NVD
Showing 50 of 8533 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
| 8.8 HIGH |
A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to run arbitrary commands via the user interface. This user interface can be used via the network and allows the execution of commands as administrative application user. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to extraction of database credentials via a world-readable credential file. This allows an attacker to connect to the database as privileged application user and to run system commands via the database. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to a local privilege escalation due to wrongly set permissions to a binary which allows any local attacker to gain administrative privileges. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to a local privilege escalation due to an exposed debug interface on the localhost. This allows any local user to gain code execution as administrative application user. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Format Plugins versions 1.1.1 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Format Plugins versions 1.1.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Format Plugins versions 1.1.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.1 HIGH |
Adobe Pass versions 3.7.3 and earlier are affected by an Incorrect Authorization vulnerability. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read and write access. Exploitation of this issue requires user interaction in that a victim must install a malicious SDK. |
0.0% | 2025-11-11 | ||
| 8.0 HIGH |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
0.1% | 2025-11-11 | ||
| 8.8 HIGH |
Improper neutralization of special elements used in a command ('command injection') in Visual Studio Code CoPilot Chat Extension allows an unauthorized attacker to execute code over a network. |
0.2% | 2025-11-11 | ||
| 8.8 HIGH |
Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network. |
0.1% | 2025-11-11 | ||
| 7.0 HIGH |
Double free in Microsoft Wireless Provisioning System allows an authorized attacker to elevate privileges locally. |
0.0% | 2025-11-11 | ||
| 7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Wireless Provisioning System allows an authorized attacker to elevate privileges locally. |
0.0% | 2025-11-11 | ||
| 7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
|
CVE-2025-62215
KEV
|
7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally. |
0.8% | 2025-11-11 | |
| 7.0 HIGH |
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 8.7 HIGH |
Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network. |
0.1% | 2025-11-11 | ||
| 8.7 HIGH |
Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 8.0 HIGH |
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
1.5% | 2025-11-11 | ||
| 7.8 HIGH |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 7.1 HIGH |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
0.5% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator on iPad versions 3.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator versions 28.7.10, 29.8.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator on iPad versions 3.0.9 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator on iPad versions 3.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Illustrator versions 28.7.10, 29.8.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Photoshop Desktop versions 26.8.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
0.0% | 2025-11-11 | ||
| 7.8 HIGH |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 7.1 HIGH |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Privilege context switching error in Windows Administrator Protection allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.0 HIGH |
Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Untrusted search path in Windows Administrator Protection allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.0 HIGH |
Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.0 HIGH |
Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 8.0 HIGH |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Heap-based buffer overflow in Windows OLE allows an unauthorized attacker to execute code locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally. |
0.3% | 2025-11-11 | ||
| 7.8 HIGH |
Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Use after free in Multimedia Class Scheduler Service (MMCSS) allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.8 HIGH |
Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-11-11 | ||
| 7.5 HIGH |
Missing cryptographic step in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network. |
0.0% | 2025-11-11 |