Filtered by vendor Microsoft
Subscriptions
Filtered by product Windows
Subscriptions
Total
7550 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-3747 | 3 Adobe, Apple, Microsoft | 4 Acrobat Dc, Acrobat Reader Dc, Macos and 1 more | 2024-08-04 | 7.5 High |
Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | ||||
CVE-2020-3727 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3728 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3735 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3731 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3724 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3732 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3721 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3712 | 2 Adobe, Microsoft | 2 Illustrator Cc, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3739 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3714 | 2 Adobe, Microsoft | 2 Illustrator Cc, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3730 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3710 | 2 Adobe, Microsoft | 2 Illustrator Cc, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3729 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3711 | 2 Adobe, Microsoft | 2 Illustrator Cc, Windows | 2024-08-04 | 7.8 High |
Adobe Illustrator CC versions 24.0 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-3733 | 2 Adobe, Microsoft | 2 Framemaker, Windows | 2024-08-04 | 8.8 High |
Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
CVE-2020-0601 | 2 Golang, Microsoft | 5 Go, Windows, Windows 10 and 2 more | 2024-08-04 | 8.1 High |
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'. | ||||
CVE-2020-0561 | 4 Intel, Linux, Microsoft and 1 more | 5 Software Guard Extensions Sdk, Linux Kernel, Windows and 2 more | 2024-08-04 | 7.8 High |
Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2021-46873 | 2 Microsoft, Wireguard | 2 Windows, Wireguard | 2024-08-04 | 5.3 Medium |
WireGuard, such as WireGuard 0.5.3 on Windows, does not fully account for the possibility that an adversary might be able to set a victim's system time to a future value, e.g., because unauthenticated NTP is used. This can lead to an outcome in which one static private key becomes permanently useless. | ||||
CVE-2021-46702 | 2 Microsoft, Torproject | 2 Windows, Tor | 2024-08-04 | 5.5 Medium |
Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory. |