Export limit exceeded: 335023 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 335023 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (335023 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-21363 1 Microsoft 5 365 Apps, Office 2024, Office Long Term Servicing Channel and 2 more 2026-02-26 7.8 High
Microsoft Word Remote Code Execution Vulnerability
CVE-2025-29795 1 Microsoft 2 Edge Update, Edge Update Setup 2026-02-26 7.8 High
Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally.
CVE-2024-35279 1 Fortinet 1 Fortios 2026-02-26 7.7 High
A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.
CVE-2025-21365 1 Microsoft 3 365 Apps, Office 2024, Office Long Term Servicing Channel 2026-02-26 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2025-2746 1 Kentico 1 Xperience 2026-02-26 9.8 Critical
An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server password handling of empty SHA1 usernames in digest authentication. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.172.
CVE-2024-50567 1 Fortinet 1 Fortiweb 2026-02-26 6.8 Medium
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb 7.4.0 through 7.6.0 allows attacker to execute unauthorized code or commands via crafted input.
CVE-2025-21366 1 Microsoft 8 365 Apps, Access, Access 2016 and 5 more 2026-02-26 7.8 High
Microsoft Access Remote Code Execution Vulnerability
CVE-2025-2747 1 Kentico 1 Xperience 2026-02-26 9.8 Critical
An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server component password handling for the server defined None type. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.178.
CVE-2024-27781 1 Fortinet 1 Fortisandbox 2026-02-26 6.9 Medium
An improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.4, FortiSandbox 4.2.1 through 4.2.6, FortiSandbox 4.0.0 through 4.0.4, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions allows an authenticated attacker to execute unauthorized code or commands via crafted HTTP requests.
CVE-2025-21395 1 Microsoft 8 365 Apps, Access, Access 2016 and 5 more 2026-02-26 7.8 High
Microsoft Access Remote Code Execution Vulnerability
CVE-2025-26512 1 Netapp 1 Snapcenter 2026-02-26 9.9 Critical
SnapCenter versions prior to 6.0.1P1 and 6.1P1 are susceptible to a vulnerability which may allow an authenticated SnapCenter Server user to become an admin user on a remote system where a SnapCenter plug-in has been installed.
CVE-2025-21157 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-02-26 7.8 High
InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-21403 1 Microsoft 2 On-prem Data Gateway, Sap Hana Enabled Sso For Onpremises Data Gateway 2026-02-26 6.4 Medium
On-Premises Data Gateway Information Disclosure Vulnerability
CVE-2025-1974 1 Kubernetes 1 Ingress-nginx 2026-02-26 9.8 Critical
A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CVE-2025-21158 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2026-02-26 7.8 High
InDesign Desktop versions ID20.0, ID19.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-21335 1 Microsoft 13 Windows 10 21h2, Windows 10 21h2, Windows 10 22h2 and 10 more 2026-02-26 7.8 High
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
CVE-2025-21156 1 Adobe 1 Incopy 2026-02-26 7.8 High
InCopy versions 20.0, 19.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2025-1097 1 Kubernetes 1 Ingress-nginx 2026-02-26 8.8 High
A security issue was discovered in ingress-nginx https://github.com/kubernetes/ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)
CVE-2025-21187 1 Microsoft 1 Power Automate For Desktop 2026-02-26 7.8 High
Microsoft Power Automate Remote Code Execution Vulnerability
CVE-2025-21159 1 Adobe 1 Illustrator 2026-02-26 7.8 High
Illustrator versions 29.1, 28.7.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.