Export limit exceeded: 351254 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 80847 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (80847 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-41102 1 Microsoft 2 Powerpoint, Powerpoint For Android 2026-05-13 7.1 High
Improper access control in Microsoft Office PowerPoint allows an authorized attacker to perform spoofing locally.
CVE-2026-41109 1 Microsoft 1 Visual Studio Code 2026-05-13 8.8 High
Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature over a network.
CVE-2026-42831 1 Microsoft 4 Office, Office For Android, Office Macos 2021 and 1 more 2026-05-13 7.8 High
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-34332 1 Microsoft 2 Windows Server 2025, Windows Server 2025 (server Core Installation) 2026-05-13 8 High
Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to execute code over a network.
CVE-2026-40358 1 Microsoft 7 365 Apps, Office 2016, Office 2019 and 4 more 2026-05-13 8.4 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-40362 1 Microsoft 8 365 Apps, Excel 2016, Office 2019 and 5 more 2026-05-13 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-40370 1 Microsoft 10 Microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack, Microsoft Sql Server 2017 (gdr), Microsoft Sql Server 2019 (gdr) and 7 more 2026-05-13 8.8 High
External control of file name or path in SQL Server allows an authorized attacker to execute code over a network.
CVE-2026-40418 1 Microsoft 4 365 Apps, Office 2019, Office 2021 and 1 more 2026-05-13 7.8 High
Use after free in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
CVE-2026-40381 1 Microsoft 1 Azure Connected Machine Agent 2026-05-13 7.8 High
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2026-34675 1 Adobe 1 Substance 3d Painter 2026-05-13 7.8 High
Substance3D - Painter versions 12.0.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-34676 1 Adobe 1 Substance 3d Painter 2026-05-13 7.8 High
Substance3D - Painter versions 12.0.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-34661 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2026-05-13 7.8 High
Illustrator versions 29.8.6, 30.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-34687 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2026-05-13 7.8 High
Illustrator versions 29.8.6, 30.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-8108 1 Fujielectric 1 Tellus 2026-05-13 7.8 High
The installation of Fuji Tellus adds a driver to the kernel which grants all users read and write permissions.
CVE-2026-35091 2 Corosync, Redhat 10 Corosync, Enterprise Linux, Enterprise Linux Eus and 7 more 2026-05-13 8.2 High
A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents
CVE-2026-4890 1 Dnsmasq 1 Dnsmasq 2026-05-13 7.5 High
A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.
CVE-2026-27662 2026-05-13 7.7 High
Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place. This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potentially enabling the discovery of backdoors, performing unauthorized actions, or exploiting misconfigurations that may lead to further system compromise.
CVE-2026-44412 1 Siemens 1 Solid Edge Se2026 2026-05-13 7.8 High
A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
CVE-2026-34648 1 Adobe 1 Adobe Commerce 2026-05-13 7.5 High
Adobe Commerce versions 2.4.9-beta1, 2.4.8-p4, 2.4.7-p9, 2.4.6-p14, 2.4.5-p16, 2.4.4-p17 and earlier are affected by an Uncontrolled Resource Consumption vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to exhaust system resources, resulting in an application denial-of-service condition. Exploitation of this issue does not require user interaction.
CVE-2026-34650 1 Adobe 1 Adobe Commerce 2026-05-13 7.5 High
Adobe Commerce versions 2.4.9-beta1, 2.4.8-p4, 2.4.7-p9, 2.4.6-p14, 2.4.5-p16, 2.4.4-p17 and earlier are affected by an Uncontrolled Resource Consumption vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to exhaust system resources, resulting in an application denial-of-service condition. Exploitation of this issue does not require user interaction.