Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Microsoft Subscribe
Total 17397 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-9559 2 Adobe, Microsoft 2 Bridge, Windows 2020-06-29 9.3 HIGH 7.8 HIGH
Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9560 2 Adobe, Microsoft 2 Bridge, Windows 2020-06-29 9.3 HIGH 7.8 HIGH
Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9561 2 Adobe, Microsoft 2 Bridge, Windows 2020-06-29 9.3 HIGH 7.8 HIGH
Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9562 2 Adobe, Microsoft 2 Bridge, Windows 2020-06-29 9.3 HIGH 7.8 HIGH
Adobe Bridge versions 10.0.1 and earlier version have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-9563 2 Adobe, Microsoft 2 Bridge, Windows 2020-06-29 9.3 HIGH 7.8 HIGH
Adobe Bridge versions 10.0.1 and earlier version have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-9564 2 Adobe, Microsoft 2 Bridge, Windows 2020-06-29 9.3 HIGH 7.8 HIGH
Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9565 2 Adobe, Microsoft 2 Bridge, Windows 2020-06-29 9.3 HIGH 7.8 HIGH
Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9566 2 Adobe, Microsoft 2 Bridge, Windows 2020-06-29 9.3 HIGH 7.8 HIGH
Adobe Bridge versions 10.0.1 and earlier version have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9567 2 Adobe, Microsoft 2 Bridge, Windows 2020-06-29 9.3 HIGH 7.8 HIGH
Adobe Bridge versions 10.0.1 and earlier version have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2020-9569 2 Adobe, Microsoft 2 Bridge, Windows 2020-06-29 9.3 HIGH 7.8 HIGH
Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2015-6152 1 Microsoft 6 Internet Explorer, Windows 7, Windows 8 and 3 more 2020-06-24 9.3 HIGH N/A
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6162.
CVE-2008-0751 2 Microsoft, S9y 2 Internet Explorer, Serendipity Event Freetag 2020-06-23 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in the Freetag before 2.96 plugin for S9Y Serendipity, when using Internet Explorer 6 or 7, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to plugin/tag/.
CVE-2020-4320 5 Hp, Ibm, Linux and 2 more 6 Hp-ux, Aix, Mq and 3 more 2020-06-22 4.0 MEDIUM 6.5 MEDIUM
IBM MQ Appliance and IBM MQ AMQP Channels 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD do not correctly block or allow clients based on the certificate distinguished name SSLPEER setting. IBM X-Force ID: 177403.
CVE-2020-4310 5 Hp, Ibm, Linux and 2 more 7 Hp-ux, Aix, Mq and 4 more 2020-06-20 5.0 MEDIUM 7.5 HIGH
IBM MQ and MQ Appliance 7.1, 7.5, 8.0, 9.0 LTS, 9.1 LTS, and 9.1 C are vulnerable to a denial of service attack due to an error within the Data Conversion logic. IBM X-Force ID: 177081.
CVE-2020-4406 3 Ibm, Linux, Microsoft 5 Aix, Spectrum Protect Client, Spectrum Protect For Space Management and 2 more 2020-06-18 3.5 LOW 5.4 MEDIUM
IBM Spectrum Protect Client 8.1.7.0 through 8.1.9.1 (Linux and Windows), 8.1.9.0 trough 8.1.9.1 (AIX) and IBM Spectrum Protect for Space Management 8.1.7.0 through 8.1.9.1 (Linux), 8.1.9.0 through 8.1.9.1 (AIX) web user interfaces could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 179488.
CVE-2020-1220 1 Microsoft 9 Edge, Windows 10, Windows 7 and 6 more 2020-06-16 5.8 MEDIUM 6.1 MEDIUM
A spoofing vulnerability exists when theMicrosoft Edge (Chromium-based) in IE Mode improperly handles specific redirects, aka 'Microsoft Edge (Chromium-based) in IE Mode Spoofing Vulnerability'.
CVE-2020-1300 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2020-06-16 6.8 MEDIUM 8.8 HIGH
A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files.To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver.The update addresses the vulnerability by correcting how Windows handles cabinet files., aka 'Windows Remote Code Execution Vulnerability'.
CVE-2020-1323 1 Microsoft 2 Sharepoint Enterprise Server, Sharepoint Server 2020-06-16 5.8 MEDIUM 6.1 MEDIUM
An open redirect vulnerability exists in Microsoft SharePoint that could lead to spoofing.To exploit the vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link, aka 'SharePoint Open Redirect Vulnerability'.
CVE-2020-1340 1 Microsoft 1 Nugetgallery 2020-06-16 3.5 LOW 5.4 MEDIUM
A spoofing vulnerability exists when the NuGetGallery does not properly sanitize input on package metadata values, aka 'NuGetGallery Spoofing Vulnerability'.
CVE-2020-1299 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2020-06-15 9.3 HIGH 8.8 HIGH
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.