Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Windows
Total 8050 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-47134 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-07-10 N/A 7.8 HIGH
InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-47136 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-07-10 N/A 7.8 HIGH
InDesign Desktop versions 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-49532 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-10 N/A 7.8 HIGH
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-30313 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-10 N/A 5.5 MEDIUM
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43591 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-07-10 N/A 7.8 HIGH
InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43592 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-07-10 N/A 7.8 HIGH
InDesign Desktop versions 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-43594 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-07-10 N/A 7.8 HIGH
InDesign Desktop versions 19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-47103 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2025-07-10 N/A 7.8 HIGH
InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-49526 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-10 N/A 7.8 HIGH
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-49527 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-10 N/A 7.8 HIGH
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-49528 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-10 N/A 7.8 HIGH
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-49529 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-10 N/A 7.8 HIGH
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-49530 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-10 N/A 7.8 HIGH
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-49531 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-10 N/A 7.8 HIGH
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-49524 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2025-07-10 N/A 5.5 MEDIUM
Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-26646 3 Apple, Linux, Microsoft 6 Macos, Linux Kernel, .net and 3 more 2025-07-10 N/A 8.0 HIGH
External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.
CVE-2025-21171 3 Apple, Linux, Microsoft 6 Macos, Linux Kernel, .net and 3 more 2025-07-10 N/A 7.5 HIGH
.NET Remote Code Execution Vulnerability
CVE-2025-30399 3 Apple, Linux, Microsoft 6 Macos, Linux Kernel, .net and 3 more 2025-07-10 N/A 7.5 HIGH
Untrusted search path in .NET and Visual Studio allows an unauthorized attacker to execute code over a network.
CVE-2024-52928 2 Microsoft, Thebrowser 2 Windows, Arc 2025-07-10 N/A 9.6 CRITICAL
Arc before 1.26.1 on Windows has a bypass issue in the site settings that allows websites (with previously granted permissions) to add new permissions when the user clicks anywhere on the website.
CVE-2024-32488 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2025-07-09 N/A 7.8 HIGH
In Foxit PDF Reader and Editor before 2024.1, Local Privilege Escalation could occur during update checks because weak permissions on the update-service folder allow attackers to place crafted DLL files there.