Search Results (74558 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-49572 1 Adobe 1 Substance 3d Modeler 2026-02-26 7.8 High
Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54092 1 Microsoft 21 Hyper-v, Windows, Windows 10 and 18 more 2026-02-26 7.8 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2025-49573 1 Adobe 1 Substance 3d Modeler 2026-02-26 7.8 High
Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54093 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2026-02-26 7 High
Time-of-check time-of-use (toctou) race condition in Windows TCP/IP allows an authorized attacker to elevate privileges locally.
CVE-2025-54187 1 Adobe 1 Substance 3d Painter 2026-02-26 7.8 High
Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54098 1 Microsoft 27 Windows, Windows 10, Windows 10 1507 and 24 more 2026-02-26 7.8 High
Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2025-54206 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-02-26 7.8 High
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54105 1 Microsoft 5 Windows 11 24h2, Windows 11 24h2, Windows Server 2022 23h2 and 2 more 2026-02-26 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.
CVE-2025-54212 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-02-26 7.8 High
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54108 1 Microsoft 3 Windows 11 24h2, Windows 11 24h2, Windows Server 2025 2026-02-26 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.
CVE-2025-54226 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-02-26 7.8 High
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54113 1 Microsoft 11 Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 Sp2 and 8 more 2026-02-26 8.8 High
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
CVE-2025-54208 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-02-26 7.8 High
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54115 1 Microsoft 21 Hyper-v, Windows, Windows 10 and 18 more 2026-02-26 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2025-54209 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-02-26 7.8 High
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54900 1 Microsoft 13 365, 365 Apps, Excel and 10 more 2026-02-26 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54225 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-02-26 7.8 High
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-54910 1 Microsoft 9 365 Apps, Office, Office 2016 and 6 more 2026-02-26 8.4 High
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-55224 1 Microsoft 21 Hyper-v, Windows, Windows 10 and 18 more 2026-02-26 7.8 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally.
CVE-2025-54210 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-02-26 7.8 High
InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.