Search

Search Results (326718 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-64785 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2026-01-07 7.8 High
Acrobat Reader versions 24.001.30264, 20.005.30793, 25.001.20982, 24.001.30273, 20.005.30803 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code in the context of the current user. If the application uses a search path to locate critical resources such as programs, an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue does not require user interaction.
CVE-2025-14422 1 Gimp 1 Gimp 2026-01-07 7.8 High
GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.
CVE-2025-14423 1 Gimp 1 Gimp 2026-01-07 7.8 High
GIMP LBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of LBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28311.
CVE-2025-14424 1 Gimp 1 Gimp 2026-01-07 7.8 High
GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.
CVE-2025-55335 1 Microsoft 26 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 23 more 2026-01-07 7.4 High
Use after free in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
CVE-2025-59206 1 Microsoft 5 Windows 11 24h2, Windows 11 24h2, Windows 11 25h2 and 2 more 2026-01-07 7.4 High
Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVE-2025-59207 1 Microsoft 18 Windows 10 1809, Windows 10 21h2, Windows 10 21h2 and 15 more 2026-01-07 7.8 High
Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2025-59228 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2026-01-07 8.8 High
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CVE-2025-59231 1 Microsoft 12 365, 365 Apps, Excel and 9 more 2026-01-07 7.8 High
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-59233 1 Microsoft 12 365, 365 Apps, Excel and 9 more 2026-01-07 7.8 High
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-59234 1 Microsoft 10 365, 365 Apps, Office and 7 more 2026-01-07 7.8 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-59236 1 Microsoft 9 365 Apps, Office, Office 2019 and 6 more 2026-01-07 8.4 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-55240 1 Microsoft 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more 2026-01-07 7.3 High
Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.
CVE-2025-55678 1 Microsoft 30 Directx, Windows, Windows 10 and 27 more 2026-01-07 7 High
Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally.
CVE-2025-55680 1 Microsoft 22 Windows, Windows 10, Windows 10 1809 and 19 more 2026-01-07 7.8 High
Time-of-check time-of-use (toctou) race condition in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
CVE-2025-58724 1 Microsoft 6 Arc Enabled Servers Azure Connected Machine Agent, Azure, Azure Agent and 3 more 2026-01-07 7.8 High
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2025-58726 1 Microsoft 30 Windows, Windows 10, Windows 10 1507 and 27 more 2026-01-07 7.5 High
Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
CVE-2025-58737 1 Microsoft 11 Remote Desktop, Windows, Windows Server and 8 more 2026-01-07 7 High
Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally.
CVE-2025-59221 1 Microsoft 15 365, 365 Apps, Office and 12 more 2026-01-07 7 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-59222 1 Microsoft 15 365, 365 Apps, Office and 12 more 2026-01-07 7.8 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.