Search Results (72183 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-21304 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-01-14 7.8 High
InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-20803 1 Microsoft 2 Sql Server 2022, Sql Server 2025 2026-01-14 7.2 High
Missing authentication for critical function in SQL Server allows an authorized attacker to elevate privileges over a network.
CVE-2026-20965 1 Microsoft 1 Azure Portal Windows Admin Center 2026-01-14 7.5 High
Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.
CVE-2026-21283 3 Adobe, Apple, Microsoft 3 Bridge, Macos, Windows 2026-01-14 7.8 High
Bridge versions 15.1.2, 16.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-21281 3 Adobe, Apple, Microsoft 3 Incopy, Macos, Windows 2026-01-14 7.8 High
InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-21280 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2026-01-14 8.6 High
Illustrator versions 29.8.3, 30.0 and earlier are affected by an Untrusted Search Path vulnerability that could result in arbitrary code execution in the context of the current user. If the application uses a search path to locate critical resources such as programs, an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.
CVE-2026-21277 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-01-14 7.8 High
InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-21276 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-01-14 7.8 High
InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-21275 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-01-14 7.8 High
InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-20924 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2026-01-14 7.8 High
Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.
CVE-2026-20926 1 Microsoft 14 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 11 more 2026-01-14 7.5 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
CVE-2026-20934 1 Microsoft 14 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 11 more 2026-01-14 7.5 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
CVE-2026-20938 1 Microsoft 3 Windows 11 23h2, Windows 11 24h2, Windows 11 2h2 2026-01-14 7.8 High
Untrusted pointer dereference in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.
CVE-2026-20940 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 9 more 2026-01-14 7.8 High
Heap-based buffer overflow in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
CVE-2026-22194 1 Gestsup 1 Gestsup 2026-01-14 8.8 High
GestSup versions up to and including 3.2.60 contain a cross-site request forgery (CSRF) vulnerability where the application does not verify the authenticity of client requests. An attacker can induce a logged-in user to submit crafted requests that perform actions with the victim's privileges. This can be exploited to create privileged accounts by targeting the administrative user creation endpoint.
CVE-2026-20943 1 Microsoft 5 Office, Office 2016, Sharepoint Server and 2 more 2026-01-14 7 High
Untrusted search path in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2026-20944 1 Microsoft 3 365 Apps, Office Macos 2021, Office Macos 2024 2026-01-14 8.4 High
Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2026-20946 1 Microsoft 7 365 Apps, Excel 2016, Office 2019 and 4 more 2026-01-14 7.8 High
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-20951 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2026-01-14 7.8 High
Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.
CVE-2022-50693 1 Splashtop 1 Splashtop 2026-01-14 8.4 High
Splashtop 8.71.12001.0 contains an unquoted service path vulnerability in the Splashtop Software Updater Service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:\Program Files (x86)\Splashtop\Splashtop Software Updater\ to inject malicious executables and escalate privileges.