VYPR

CVEs

351,821 total · page 30 of 7,037

  • CVE-2026-34662MedMay 12, 2026
    risk 0.36cvss 5.5epss 0.00

    Illustrator versions 29.8.6, 30.3 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

  • CVE-2026-34661HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Illustrator versions 29.8.6, 30.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

  • CVE-2026-34644HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    After Effects versions 26.0, 25.6.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

  • CVE-2026-34643HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    After Effects versions 26.0, 25.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

  • CVE-2026-34642HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    After Effects versions 26.0, 25.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

  • CVE-2026-34640HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Media Encoder versions 26.0.2, 25.6.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

  • CVE-2026-34639HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Media Encoder versions 26.0.2, 25.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

  • CVE-2026-34638HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Premiere Pro versions 26.0.2, 25.6.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

  • CVE-2026-34637HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Premiere Pro versions 26.0.2, 25.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

  • CVE-2026-34636HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Premiere Pro versions 26.0.2, 25.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

  • CVE-2026-34351HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Concurrent execution using shared resource with improper synchronization ('race condition') in Windows TCP/IP allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34350MedMay 12, 2026
    risk 0.42cvss 6.5epss 0.00

    Null pointer dereference in Windows Storport Miniport Driver allows an unauthorized attacker to deny service over a network.

  • CVE-2026-34347HigMay 12, 2026
    risk 0.46cvss 7.0epss 0.00

    Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34345HigMay 12, 2026
    risk 0.46cvss 7.0epss 0.00

    Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34344HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Access of resource using incompatible type ('type confusion') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34343HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in Windows Application Identity (AppID) Subsystem allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34342HigMay 12, 2026
    risk 0.46cvss 7.0epss 0.00

    Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Print Spooler Components allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34341HigMay 12, 2026
    risk 0.46cvss 7.0epss 0.00

    Double free in Windows Link-Layer Discovery Protocol (LLDP) allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34340HigMay 12, 2026
    risk 0.46cvss 7.0epss 0.00

    Use after free in Windows Projected File System allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34339MedMay 12, 2026
    risk 0.36cvss 5.5epss 0.00

    Null pointer dereference in Windows LDAP - Lightweight Directory Access Protocol allows an authorized attacker to deny service locally.

  • CVE-2026-34338HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34337HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34336HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Buffer over-read in Windows DWM Core Library allows an authorized attacker to disclose information locally.

  • CVE-2026-34334HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Concurrent execution using shared resource with improper synchronization ('race condition') in Windows TCP/IP allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34333HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34332HigMay 12, 2026
    risk 0.52cvss 8.0epss 0.00

    Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to execute code over a network.

  • CVE-2026-34331HigMay 12, 2026
    risk 0.46cvss 7.0epss 0.00

    Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34330HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Integer overflow or wraparound in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.

  • CVE-2026-34329HigMay 12, 2026
    risk 0.57cvss 8.8epss 0.00

    Heap-based buffer overflow in Windows Message Queuing allows an unauthorized attacker to execute code over an adjacent network.

  • CVE-2026-33841HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

  • CVE-2026-33840HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.

  • CVE-2026-33839HigMay 12, 2026
    risk 0.46cvss 7.0epss 0.00

    Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.

  • CVE-2026-33838HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Double free in Windows Message Queuing allows an authorized attacker to elevate privileges locally.

  • CVE-2026-33837HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in Windows TCP/IP allows an authorized attacker to elevate privileges locally.

  • CVE-2026-33835HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

  • CVE-2026-33834HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Improper access control in Windows Event Logging Service allows an authorized attacker to elevate privileges locally.

  • CVE-2026-33833HigMay 12, 2026
    risk 0.53cvss 8.2epss 0.00

    Improper neutralization of special elements in output used by a downstream component ('injection') in Azure Machine Learning allows an unauthorized attacker to perform spoofing over a network.

  • CVE-2026-33821HigMay 12, 2026
    risk 0.50cvss 7.7epss 0.00

    Improper privilege management in Microsoft Dynamics 365 Customer Insights allows an authorized attacker to elevate privileges over a network.

  • CVE-2026-33117CriMay 12, 2026
    risk 0.59cvss 9.1epss 0.00

    Improper authentication in Azure SDK allows an unauthorized attacker to bypass a security feature over a network.

  • CVE-2026-33112HigMay 12, 2026
    risk 0.57cvss 8.8epss 0.01

    Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

  • CVE-2026-33110HigMay 12, 2026
    risk 0.57cvss 8.8epss 0.01

    Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

  • CVE-2026-32209MedMay 12, 2026
    risk 0.29cvss 4.4epss 0.00

    Improper access control in Windows Filtering Platform (WFP) allows an authorized attacker to bypass a security feature locally.

  • CVE-2026-32204HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    External control of file name or path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.

  • CVE-2026-32185MedMay 12, 2026
    risk 0.36cvss 5.5epss 0.00

    Files or directories accessible to external parties in Microsoft Teams allows an unauthorized attacker to perform spoofing locally.

  • CVE-2026-32177HigMay 12, 2026
    risk 0.47cvss 7.3epss 0.00

    Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally.

  • CVE-2026-32175MedMay 12, 2026
    risk 0.28cvss 4.3epss 0.00

    A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories. To exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system. The security update fixes the vulnerability by ensuring .NET Core properly handles files.

  • CVE-2026-32170MedMay 12, 2026
    risk 0.44cvss 6.7epss 0.00

    Double free in Windows Rich Text Edit Control allows an authorized attacker to elevate privileges locally.

  • CVE-2026-32161HigMay 12, 2026
    risk 0.49cvss 7.5epss 0.00

    Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Native WiFi Miniport Driver allows an unauthorized attacker to execute code over an adjacent network.

  • CVE-2026-31245MedMay 12, 2026
    risk 0.34cvss 5.3epss 0.00

    The mem0 1.0.0 server lacks authentication and authorization controls for its memory creation API endpoint (POST /memories). The endpoint allows unauthenticated users to submit arbitrary memory records without verifying their identity or permissions. A remote attacker can exploit this by sending unauthenticated POST requests to create malicious or spoofed memory entries in the database, leading to unauthorized data injection and potential data pollution.

  • CVE-2026-31244MedMay 12, 2026
    risk 0.42cvss 6.5epss 0.00

    The mem0 1.0.0 server lacks authentication and authorization controls for its memory deletion API endpoint (DELETE /memories/{memory_id}). The endpoint allows unauthenticated users to delete arbitrary memory records without verifying their identity or permissions. A remote attacker can exploit this by sending unauthenticated DELETE requests to remove any memory entry from the database, leading to unauthorized data loss and potential denial of service.