Search Results (41604 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-61836 1 Adobe 1 Illustrator On Ipad 2026-02-26 7.8 High
Illustrator on iPad versions 3.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-61829 1 Adobe 1 Illustrator On Ipad 2026-02-26 7.8 High
Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-20776 2 Google, Mediatek 46 Android, Mt6739, Mt6761 and 43 more 2026-02-26 6.7 Medium
In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184297; Issue ID: MSV-4759.
CVE-2025-61826 1 Adobe 1 Illustrator On Ipad 2026-02-26 7.8 High
Illustrator on iPad versions 3.0.9 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-61827 1 Adobe 1 Illustrator On Ipad 2026-02-26 7.8 High
Illustrator on iPad versions 3.0.9 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-61951 1 F5 22 Big-ip, Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager and 19 more 2026-02-26 7.5 High
Undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  This issue may occur when a Datagram Transport Layer Security (DTLS) 1.2 virtual server is enabled with a Server SSL profile that is configured with a certificate, key, and the SSL Sign Hash set to ANY, and the backend server is enabled with DTLS 1.2 and client authentication.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-59504 1 Microsoft 2 Azure Monitor, Azure Monitor Agent 2026-02-26 7.3 High
Heap-based buffer overflow in Azure Monitor Agent allows an unauthorized attacker to execute code locally.
CVE-2025-54854 1 F5 2 Big-ip, Big-ip Access Policy Manager 2026-02-26 7.5 High
When a BIG-IP APM OAuth access profile (Resource Server or Resource Client) is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2025-60709 1 Microsoft 27 Windows, Windows 10, Windows 10 1607 and 24 more 2026-02-26 7.8 High
Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CVE-2025-60727 1 Microsoft 13 365, 365 Apps, Excel and 10 more 2026-02-26 7.8 High
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-1547 1 Watchguard 29 Firebox M270, Firebox M290, Firebox M370 and 26 more 2026-02-26 7.2 High
A stack-based buffer overflow vulnerability [CWE-121] in WatchGuard Fireware OS's certificate request command could allow an authenticated privileged user to execute arbitrary code via specially crafted CLI commands.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.2.
CVE-2025-62220 1 Microsoft 3 Windows, Windows Subsystem For Linux, Windows Subsystem For Linux Gui 2026-02-26 8.8 High
Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network.
CVE-2025-62452 1 Microsoft 26 Windows, Windows 10, Windows 10 1607 and 23 more 2026-02-26 8 High
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2025-60714 1 Microsoft 22 Windows, Windows 10, Windows 10 1607 and 19 more 2026-02-26 7.8 High
Heap-based buffer overflow in Windows OLE allows an unauthorized attacker to execute code locally.
CVE-2025-60715 1 Microsoft 28 Remote, Windows, Windows 10 and 25 more 2026-02-26 8 High
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2025-54957 1 Dolby 1 Udc 2026-02-26 9.8 Critical
An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decoder process can occur when a malformed DD+ bitstream is processed. When Evolution data is processed by evo_priv.c from the DD+ bitstream, the decoder writes that data into a buffer. The length calculation for a write can overflow due to an integer wraparound. This can lead to the allocated buffer being too small, and the out-of-bounds check of the subsequent write to be ineffective, leading to an out-of-bounds write.
CVE-2025-60720 1 Microsoft 27 Windows, Windows 10, Windows 10 1607 and 24 more 2026-02-26 7.8 High
Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.
CVE-2025-60724 1 Microsoft 31 Graphics Component, Office, Office For Mac and 28 more 2026-02-26 9.8 Critical
Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
CVE-2025-62201 1 Microsoft 14 365, 365 Apps, Excel and 11 more 2026-02-26 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-48596 1 Google 1 Android 2026-02-26 7.8 High
In appendFrom of Parcel.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.