CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 44843 CVEs

CVE ID Severity Description EPSS Published
7.4 HIGH

A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK does not perform checks on input values potentially resulting in stack overflow. This could allow an attacker to perform code execution and denial of service.

0.0% 2026-03-10
7.4 HIGH

A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). An out-of-bounds write vulnerability exists in SICAM SIAPP SDK. This could allow an attacker to write data beyond the intended buffer, potentially leading to denial of service, or arbitrary code execution.

0.0% 2026-03-10
7.8 HIGH

Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.

0.1% 2026-03-10
7.8 HIGH

Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
8.8 HIGH

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an adjacent network.

0.1% 2026-03-10
7.8 HIGH

Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate privileges locally.

0.1% 2026-03-10
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to disclose information locally.

0.1% 2026-03-10
5.3 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network.

0.1% 2026-03-10
7.5 HIGH

Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.

0.1% 2026-03-10
5.5 MEDIUM

Out-of-bounds read in Microsoft Graphics Component allows an unauthorized attacker to disclose information locally.

0.0% 2026-03-10
7.0 HIGH

Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.1% 2026-03-10
7.0 HIGH

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
8.8 HIGH

Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.

0.1% 2026-03-10
7.8 HIGH

Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Out-of-bounds read in Windows Extensible File Allocation allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
8.0 HIGH

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

0.1% 2026-03-10
8.0 HIGH

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

0.1% 2026-03-10
7.0 HIGH

Use after free in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.0 HIGH

Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
6.2 MEDIUM

Divide by zero in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.

0.1% 2026-03-10
6.2 MEDIUM

Null pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.

0.0% 2026-03-10
7.4 HIGH

Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally.

0.4% 2026-03-10
7.8 HIGH

Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
2.7 LOW

A NULL Pointer Dereference vulnerability [CWE-476] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow an authenticated attacker to crash the HTTP daemon via crafted HTTP requests.

0.1% 2026-03-10
6.6 MEDIUM

A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0.2 through 7.0.12 may allow a remote authenticated attacker who can bypass stack protection and ASLR to execute arbitrary code or commands via crafted HTTP requests.

0.0% 2026-03-10
6.5 MEDIUM

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kerberos allows an unauthorized attacker to bypass a security feature over a network.

0.0% 2026-03-10
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.

0.1% 2026-03-10
7.8 HIGH

Improper access control in Windows Projected File System allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

0.1% 2026-03-10
6.8 MEDIUM

Heap-based buffer overflow in Windows Mobile Broadband allows an unauthorized attacker to execute code with a physical attack.

0.1% 2026-03-10
7.8 HIGH

External control of file name or path in Windows Kernel allows an authorized attacker to elevate privileges locally.

0.1% 2026-03-10
7.0 HIGH

Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
8.8 HIGH

Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
5.5 MEDIUM

Out-of-bounds read in Push Message Routing Service allows an authorized attacker to disclose information locally.

0.0% 2026-03-10
7.8 HIGH

A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 7.4.0 through 7.4.4, FortiClientLinux 7.2.2 through 7.2.12 may allow a local and unprivileged user to escalate their privileges to root.

0.0% 2026-03-10
8.1 HIGH

An Improper Control of Interaction Frequency vulnerability [CWE-799] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow a remote unauthenticated attacker to bypass the authentication rate-limit via crafted requests. The success of the attack depends on the attacker's resources and the password target complexity.

0.1% 2026-03-10
5.3 MEDIUM

This issue affects the ExtractEmbeddedFiles example inΒ Apache PDFBox: from 2.0.24 through 2.0.35, from 3.0.0 through 3.0.6. The ExtractEmbeddedFiles example contains a path traversal vulnerability (CWE-22) because the filename that is obtained from PDComplexFileSpecification.getFilename() is appended to the extraction path. Users who have copied this example into their production code should review it to ensure that the extraction path is acceptable. The example has been changed accordingly, now the initial path and the extraction paths are converted into canonical paths and it is verified that extraction path contains the initial path. The documentation has also been adjusted.

0.1% 2026-03-10
7.5 HIGH

Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.

0.1% 2026-03-10
7.8 HIGH

Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability

0.0% 2026-03-10
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
8.8 HIGH

Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a network.

0.1% 2026-03-10
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10