Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Total 20794 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-43550 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-06-27 N/A 7.8 HIGH
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43573 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-06-27 N/A 7.8 HIGH
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43574 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-06-27 N/A 7.8 HIGH
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43575 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-06-27 N/A 7.8 HIGH
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43576 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-06-27 N/A 7.8 HIGH
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43577 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-06-27 N/A 7.8 HIGH
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43578 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-06-27 N/A 5.5 MEDIUM
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43579 3 Adobe, Apple, Microsoft 6 Acrobat, Acrobat Dc, Acrobat Reader and 3 more 2025-06-27 N/A 5.5 MEDIUM
Acrobat Reader versions 24.001.30235, 20.005.30763, 25.001.20521 and earlier are affected by an Information Exposure vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to gain unauthorized access to sensitive information. Exploitation of this issue does not require user interaction.
CVE-2022-36263 2 Logitech, Microsoft 2 Streamlabs Desktop, Windows 2025-06-27 N/A 7.3 HIGH
StreamLabs Desktop Application 1.9.0 is vulnerable to Incorrect Access Control via obs64.exe. An attacker can execute arbitrary code via a crafted .exe file.
CVE-2024-3566 7 Golang, Haskell, Microsoft and 4 more 7 Go, Process Library, Windows and 4 more 2025-06-25 N/A 9.8 CRITICAL
A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.
CVE-2025-6218 2 Microsoft, Rarlab 2 Windows, Winrar 2025-06-25 N/A 7.8 HIGH
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
CVE-2025-25539 3 Linux, Microsoft, Onespan 3 Linux Kernel, Windows, Vasco Self-service Portal 2025-06-25 N/A 6.5 MEDIUM
Local File Inclusion vulnerability in Vasco v3.14and before allows a remote attacker to obtain sensitive information via help menu.
CVE-2023-26512 4 Apache, Apple, Linux and 1 more 4 Eventmesh-connector-rabbitmq, Macos, Linux Kernel and 1 more 2025-06-25 N/A 9.8 CRITICAL
CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, we will release the new version as soon as possible.
CVE-2022-30197 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-06-24 N/A 5.5 MEDIUM
Windows Kernel Information Disclosure Vulnerability
CVE-2022-30194 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-06-24 N/A 7.5 HIGH
Windows WebBrowser Control Remote Code Execution Vulnerability
CVE-2022-30176 1 Microsoft 1 Azure Real Time Operating System Guix Studio 2025-06-24 N/A 7.8 HIGH
Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-30175 1 Microsoft 1 Azure Real Time Operating System Guix Studio 2025-06-24 N/A 7.8 HIGH
Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2025-5419 2 Google, Microsoft 2 Chrome, Edge Chromium 2025-06-23 N/A 8.8 HIGH
Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2025-29976 1 Microsoft 1 Sharepoint Server 2025-06-23 N/A 7.8 HIGH
Improper privilege management in Microsoft Office SharePoint allows an authorized attacker to elevate privileges locally.
CVE-2025-29840 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2025-06-23 N/A 8.8 HIGH
Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.