CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 138709 CVEs

CVE ID Severity Description EPSS Published
7.8 HIGH

After Effects versions 25.6 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2026-02-10
7.8 HIGH

After Effects versions 25.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2026-02-10
5.5 MEDIUM

After Effects versions 25.6 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2026-02-10
7.8 HIGH

After Effects versions 25.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2026-02-10
5.5 MEDIUM

Audition versions 25.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2026-02-10
5.5 MEDIUM

Audition versions 25.3 and earlier are affected by an Access of Memory Location After End of Buffer vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to cause the application to crash or become unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2026-02-10
5.5 MEDIUM

Audition versions 25.3 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2026-02-10
5.5 MEDIUM

Audition versions 25.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2026-02-10
5.5 MEDIUM

Audition versions 25.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2026-02-10
7.8 HIGH

Audition versions 25.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

0.0% 2026-02-10
5.5 MEDIUM

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

0.0% 2026-02-10
7.5 HIGH

Exposure of sensitive information to an unauthorized actor in Microsoft Office Outlook allows an unauthorized attacker to perform spoofing over a network.

0.1% 2026-02-10
7.8 HIGH

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to elevate privileges locally.

0.0% 2026-02-10
5.5 MEDIUM

Improper input validation in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

0.1% 2026-02-10
8.0 HIGH

Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an authorized attacker to elevate privileges over a network.

0.0% 2026-02-10
8.8 HIGH

Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code over a network.

0.0% 2026-02-10
8.8 HIGH

Improper access control in Windows Hyper-V allows an authorized attacker to bypass a security feature locally.

0.0% 2026-02-10
7.0 HIGH

Use after free in Mailslot File System allows an authorized attacker to elevate privileges locally.

0.1% 2026-02-10
7.8 HIGH

Use after free in Windows Cluster Client Failover allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.8 HIGH

Untrusted pointer dereference in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
3.3 LOW

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

0.1% 2026-02-10
7.3 HIGH

Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to execute code locally.

0.0% 2026-02-10
7.3 HIGH

Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally.

0.1% 2026-02-10
7.8 HIGH

Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.8 HIGH

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.3 HIGH

Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to execute code locally.

0.0% 2026-02-10
7.5 HIGH

Null pointer dereference in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

0.1% 2026-02-10
7.0 HIGH

Use after free in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.0 HIGH

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.8 HIGH

Time-of-check time-of-use (toctou) race condition in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.8 HIGH

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.8 HIGH

Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.8 HIGH

Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.3 HIGH

Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.8 HIGH

Untrusted pointer dereference in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
7.8 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally.

0.0% 2026-02-10
8.0 HIGH

Improper input validation in Power BI allows an authorized attacker to execute code over a network.

0.1% 2026-02-10
8.1 HIGH

Improper certificate validation in Azure Local allows an unauthorized attacker to execute code over a network.

0.1% 2026-02-10
5.5 MEDIUM

Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally.

0.0% 2026-02-10
7.5 HIGH

Improper handling of missing special element in .NET allows an unauthorized attacker to perform spoofing over a network.

0.0% 2026-02-10
7.5 HIGH

Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network.

0.1% 2026-02-10
7.8 HIGH

Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code locally.

0.1% 2026-02-10
5.3 MEDIUM

Certain HP OfficeJet Pro printers may expose information if Cross‑Origin Resource Sharing (CORS) is misconfigured, potentially allowing unauthorized web origins to access device resource. CORS is disabled by default on Pro‑class devices and can only be enabled by an administrator through the Embedded Web Server (EWS). Keeping CORS disabled unless explicitly required helps ensure that only trusted solutions can interact with the device.

0.0% 2026-02-10
5.3 MEDIUM

Certain HP OfficeJet Pro printers may be vulnerable to potential denial of service when the IPP requests are mishandled, failing to establish a TCP connection.

0.1% 2026-02-10
6.5 MEDIUM

On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.

0.1% 2026-02-10
8.8 HIGH

On TP-Link Tapo C260 v1, command injection vulnerability exists due to improper sanitization in certain POST parameters during configuration synchronization. An authenticated attacker can execute arbitrary system commands with high impact on confidentiality, integrity and availability. It may cause full device compromise.

0.2% 2026-02-10
7.8 HIGH

A path traversal vulnerability was identified TP-Link Tapo C260 v1, D235 v1 and C520WS v2.6 within the HTTP server’s handling of GET requests. The server performs path normalization before fully decoding URL encoded input and falls back to using the raw path when normalization fails. An attacker can exploit this logic flaw by supplying crafted, URL encoded traversal sequences that bypass directory restrictions and allow access to files outside the intended web root. Successful exploitation may allow authenticated attackers to get disclosure of sensitive system files and credentials, while unauthenticated attackers may gain access to non-sensitive static assets.

0.1% 2026-02-10
N/A

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

- 2026-02-10