CVE Database

Comprehensive vulnerability intelligence with advanced analytics

8.2

Arbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affected devices.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.05%
View Details
7.8

InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details
7.8

Bridge versions 15.1.2, 16.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: adobe bridge
EPSS: 0.03%
View Details
7.8

InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: adobe incopy
EPSS: 0.03%
View Details
8.6

Illustrator versions 29.8.3, 30.0 and earlier are affected by an Untrusted Search Path vulnerability that could result in arbitrary code execution in the context of the current user. If the application uses a search path to locate critical resources such as programs, an attacker could modify that search path to…

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: adobe illustrator
EPSS: 0.03%
View Details
7.8

InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details
7.8

InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details
7.8

InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details
7.8

Dreamweaver Desktop versions 21.6 and earlier are affected by an Incorrect Authorization vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass security measures and execute unauthorized code. Exploitation of this issue requires user interaction in that…

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details
8.6

Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could lead to arbitrary file system write. An attacker could leverage this vulnerability to manipulate or inject malicious data into files on the system. Exploitation of this issue requires user interaction in that a victim…

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details
8.6

Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details
8.6

Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details
8.6

Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue requires user interaction in that a victim must open a malicious file…

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.03%
View Details
7.5

Deserialization of untrusted data in Azure Core shared client library for Python allows an authorized attacker to execute code over a network.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.45%
View Details
7.8

Stack-based buffer overflow in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft azure_connected_machine_agent
EPSS: 0.05%
View Details
7.0

Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details
7.0

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.05%
View Details
7.5

Improper verification of cryptographic signature in Windows Admin Center allows an authorized attacker to elevate privileges locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
EPSS: 0.04%
View Details
8.8

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft sharepoint_server
EPSS: 0.50%
View Details
7.8

Integer underflow (wrap or wraparound) in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.05%
View Details
7.8

Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.04%
View Details
7.8

Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.04%
View Details
8.4

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.03%
View Details
8.4

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.03%
View Details