Export limit exceeded: 24092 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (24092 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-34661 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2026-05-13 7.8 High
Illustrator versions 29.8.6, 30.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-34687 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2026-05-13 7.8 High
Illustrator versions 29.8.6, 30.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-41095 1 Microsoft 12 Windows Server 2012 R2, Windows Server 2012 R2, Windows Server 2012 R2 (server Core Installation) and 9 more 2026-05-12 7.8 High
Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally.
CVE-2026-40367 1 Microsoft 10 365 Apps, Office 2019, Office 2021 and 7 more 2026-05-12 8.4 High
Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2026-34662 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2026-05-12 5.5 Medium
Illustrator versions 29.8.6, 30.3 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-40359 1 Microsoft 8 365 Apps, Excel 2016, Office 2019 and 5 more 2026-05-12 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2026-7910 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-05-12 4.7 Medium
Use after free in Views in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: High)
CVE-2026-42898 1 Microsoft 1 Dynamics 365 2026-05-12 9.9 Critical
Improper control of generation of code ('code injection') in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to execute code over a network.
CVE-2026-41086 1 Microsoft 1 Azure Portal Windows Admin Center 2026-05-12 8.8 High
Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges over a network.
CVE-2026-7431 2 Ivanti, Microsoft 2 Secure Access Client, Windows 2026-05-12 4.4 Medium
An incorrect permission assignment for critical resource of Ivanti Secure Access Client   before 22.8R6 allows a local authenticated user to read or modify sensitive log data via write access to a shared memory section.
CVE-2026-7432 2 Ivanti, Microsoft 2 Secure Access Client, Windows 2026-05-12 7.8 High
A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM
CVE-2026-40361 1 Microsoft 7 365 Apps, Office 2019, Office 2021 and 4 more 2026-05-12 8.4 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2026-40374 1 Microsoft 1 Power Automate For Desktop 2026-05-12 6.5 Medium
Exposure of sensitive information to an unauthorized actor in Power Automate allows an authorized attacker to disclose information over a network.
CVE-2026-35436 1 Microsoft 4 365 Apps, Office 2019, Office 2021 and 1 more 2026-05-12 8.8 High
Insufficient granularity of access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
CVE-2026-34663 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2026-05-12 5.5 Medium
Illustrator versions 29.8.6, 30.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to disclose sensitive information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2026-40379 1 Microsoft 1 Azure Enterprise Security Token Service 2026-05-12 9.3 Critical
Exposure of sensitive information to an unauthorized actor in Azure Entra ID allows an unauthorized attacker to perform spoofing over a network.
CVE-2026-40420 1 Microsoft 4 365 Apps, Office 2019, Office 2021 and 1 more 2026-05-12 8.8 High
Improper access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.
CVE-2026-41103 1 Microsoft 2 Confluence Saml Sso Plugin, Jira Saml Sso Plugin 2026-05-12 9.1 Critical
Incorrect implementation of authentication algorithm in Microsoft SSO Plugin for Jira & Confluence allows an unauthorized attacker to elevate privileges over a network.
CVE-2026-41613 1 Microsoft 1 Visual Studio Code 2026-05-12 8.8 High
Session fixation in Visual Studio Code allows an unauthorized attacker to elevate privileges over a network.
CVE-2023-44487 33 Akka, Amazon, Apache and 30 more 378 Http Server, Opensearch Data Prepper, Apisix and 375 more 2026-05-12 7.5 High
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.