Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Total 22861 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2026-0906 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-01-29 N/A 9.8 CRITICAL
Incorrect security UI in Google Chrome on Android prior to 144.0.7559.59 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
CVE-2026-0905 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-01-29 N/A 9.8 CRITICAL
Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.59 allowed an attack who obtained a network log file to potentially obtain potentially sensitive information via a network log file. (Chromium security severity: Medium)
CVE-2026-0904 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-01-29 N/A 5.4 MEDIUM
Incorrect security UI in Digital Credentials in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-0903 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-01-29 N/A 5.4 MEDIUM
Inappropriate implementation in Downloads in Google Chrome on Windows prior to 144.0.7559.59 allowed a remote attacker to bypass dangerous file type protections via a malicious file. (Chromium security severity: Medium)
CVE-2026-0902 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-01-29 N/A 8.8 HIGH
Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
CVE-2026-0900 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-01-29 N/A 8.8 HIGH
Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2026-0899 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2026-01-29 N/A 8.8 HIGH
Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2025-14625 2 Intel, Microsoft 2 Quartus Prime, Windows 2026-01-28 N/A 6.7 MEDIUM
Uncontrolled Search Path Element vulnerability in Altera Quartus Prime Standard on Windows (Nios II Command Shell modules), Altera Quartus Prime Lite on Windows (Nios II Command Shell modules) allows Search Order Hijacking.This issue affects Quartus Prime Standard: from 19.1 through 24.1; Quartus Prime Lite: from 19.1 through 24.1.
CVE-2026-23889 2 Microsoft, Pnpm 2 Windows, Pnpm 2026-01-28 N/A 6.5 MEDIUM
pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm's tarball extraction allows malicious packages to write files outside the package directory on Windows. The path normalization only checks for `./` but not `.\`. On Windows, backslashes are directory separators, enabling path traversal. This vulnerability is Windows-only. This issue impacts Windows pnpm users and Windows CI/CD pipelines (GitHub Actions Windows runners, Azure DevOps). It can lead to overwriting `.npmrc`, build configs, or other files. Version 10.28.1 contains a patch.
CVE-2024-1545 3 Linux, Microsoft, Wolfssl 3 Linux Kernel, Windows, Wolfssl 2026-01-27 N/A 5.9 MEDIUM
Fault Injection vulnerability in RsaPrivateDecryption function in wolfssl/wolfcrypt/src/rsa.c in WolfSSL wolfssl5.6.6 on Linux/Windows allows remote attacker co-resides in the same system with a victim process to disclose information and escalate privileges via Rowhammer fault injection to the RsaKey structure.
CVE-2026-21509 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2026-01-27 N/A 7.8 HIGH
Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.
CVE-2025-54313 5 Alexghr, Homarr, Microsoft and 2 more 8 Got-fetch, Homarr, Windows and 5 more 2026-01-23 N/A 7.5 HIGH
eslint-config-prettier 8.10.1, 9.1.1, 10.1.6, and 10.1.7 has embedded malicious code for a supply chain compromise. Installing an affected package executes an install.js file that launches the node-gyp.dll malware on Windows.
CVE-2022-46764 2 Microsoft, Trueconf 2 Windows, Server 2026-01-21 N/A 9.8 CRITICAL
A SQL injection issue in the web API in TrueConf Server 5.2.0.10225 (fixed in 5.2.6) allows remote unauthenticated attackers to execute arbitrary SQL commands, ultimately leading to remote code execution.
CVE-2022-46763 2 Microsoft, Trueconf 2 Windows, Server 2026-01-21 N/A 8.8 HIGH
A SQL injection issue in a database stored function in TrueConf Server 5.2.0.10225 (fixed in 5.2.6) allows a low-privileged database user to execute arbitrary SQL commands as the database administrator, resulting in execution of arbitrary code.
CVE-2025-26627 1 Microsoft 1 Azure Arc 2026-01-20 N/A 7.0 HIGH
Improper neutralization of special elements used in a command ('command injection') in Azure Arc allows an authorized attacker to elevate privileges locally.
CVE-2026-21226 1 Microsoft 1 Azure Sdk For Python 2026-01-20 N/A 7.5 HIGH
Deserialization of untrusted data in Azure Core shared client library for Python allows an authorized attacker to execute code over a network.
CVE-2025-10198 2 Lizardbyte, Microsoft 2 Sunshine, Windows 2026-01-20 N/A 7.8 HIGH
Sunshine for Windows, version v2025.122.141614, contains a DLL search-order hijacking vulnerability, allowing attackers to insert a malicious DLL in user-writeable PATH directories.
CVE-2025-64663 1 Microsoft 1 Azure Language 2026-01-16 N/A 9.9 CRITICAL
Custom Question Answering Elevation of Privilege Vulnerability
CVE-2024-58315 2 Microsoft, Tosi 2 Windows, Tosibox Key 2026-01-16 N/A 7.8 HIGH
Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.
CVE-2025-64677 1 Microsoft 1 Office Out-of-box Experience 2026-01-16 N/A 8.2 HIGH
Improper neutralization of input during web page generation ('cross-site scripting') in Office Out-of-Box Experience allows an unauthorized attacker to perform spoofing over a network.