TROYANOSYVIRUS

Vulnerabilidades CVE

Base de datos de vulnerabilidades CVE enriquecida con datos de CISA KEV y NVD

Total: 6,026 CVEs
CVE IDCVSSSeveridadKEVAvistamientos
CVE-2026-26162

Access of resource using incompatible type ('type confusion') in Windows OLE allows an authorized attacker to elevate privileges locally.

7.8HIGHβ€”0
CVE-2026-26163

Double free in Windows Kernel allows an authorized attacker to elevate privileges locally.

7.8HIGHβ€”0
CVE-2026-40320

Giskard is an open-source testing framework for AI models. In versions prior to 1.0.2b1, the ConformityCheck class rendered the rule parameter through Jinja2's default Template() constructor, silently...

7.8HIGHβ€”0
CVE-2026-35368

A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() after entering the chroot but before dropp...

7.8HIGHβ€”0
CVE-2026-41477

Deskflow is a keyboard and mouse sharing app. In 1.20.0, 1.26.0.134, and earlier, Deskflow daemon runs as SYSTEM and exposes an IPC named pipe with WorldAccessOption enabled. The daemon processes pri...

7.8HIGHβ€”0
CVE-2026-42171

NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to gain privileges (if they can cause my_GetTem...

7.8HIGHβ€”0
CVE-2025-14821

A flaw was found in libssh. This vulnerability allows local man-in-the-middle attacks, security downgrades of SSH (Secure Shell) connections, and manipulation of trusted host information, posing a sig...

7.8HIGHβ€”0
CVE-2026-23427

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in durable v2 replay of active file handles parse_durable_handle_context() unconditionally assigns dh_in...

7.8HIGHβ€”0
CVE-2026-23432

In the Linux kernel, the following vulnerability has been resolved: mshv: Fix use-after-free in mshv_map_user_memory error path In the error path of mshv_map_user_memory(), calling vfree() directly ...

7.8HIGHβ€”0
CVE-2026-23447

In the Linux kernel, the following vulnerability has been resolved: net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check The same bounds-check bug fixed for NDP16 in the previous patch als...

7.8HIGHβ€”0
CVE-2026-34937

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "<code>" and passing...

7.8HIGHβ€”0
CVE-2016-20056

Spy Emergency build 23.0.205 contains an unquoted service path vulnerability in the SpyEmrgHealth and SpyEmrgSrv services that allows local attackers to escalate privileges by inserting malicious exec...

7.8HIGHβ€”0
CVE-2016-20058

Netgate AMITI Antivirus build 23.0.305 contains an unquoted service path vulnerability in the AmitiAvSrv and AmitiAntivirusHealth services that allows local attackers to escalate privileges. Attackers...

7.8HIGHβ€”0
CVE-2016-20059

IObit Malware Fighter 4.3.1 contains an unquoted service path vulnerability in the IMFservice and LiveUpdateSvc services that allows local attackers to escalate privileges. Attackers can insert a mali...

7.8HIGHβ€”0
CVE-2016-20060

Hotspot Shield 6.0.3 contains an unquoted service path vulnerability in the hshld service binary that allows local attackers to escalate privileges by injecting malicious executables. Attackers can pl...

7.8HIGHβ€”0
CVE-2024-14032

Twitch Studio version 0.114.8 and prior contain a privilege escalation vulnerability in its privileged helper tool that allows local attackers to execute arbitrary code as root by exploiting an unprot...

7.8HIGHβ€”0
CVE-2026-21376

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

7.8HIGHβ€”0
CVE-2026-21378

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

7.8HIGHβ€”0
CVE-2026-35043

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was n...

7.8HIGHβ€”0
CVE-2026-34588

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.1.0 to before 3.2.7, 3.3.9, and 3.4.9, internal_...

7.8HIGHβ€”0
CVE-2026-32861

There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVCLASS file in NI LabVIEW.Β  This vulnerability may result in information disclosure or arbitrary code...

7.8HIGHβ€”0
CVE-2026-33825

Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.

7.8HIGHKEV0
CVE-2026-30266

Insecure Permissions vulnerability in DeepCool DeepCreative v.1.2.12 and before allows a local attacker to execute arbitrary code via a crafted file

7.8HIGHβ€”0
CVE-2025-47389

Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation.

7.8HIGHβ€”0
CVE-2025-47390

Memory corruption while preprocessing IOCTL request in JPEG driver.

7.8HIGHβ€”0
CVE-2025-47391

Memory corruption while processing a frame request from user.

7.8HIGHβ€”0
CVE-2026-21371

Memory Corruption when retrieving output buffer with insufficient size validation.

7.8HIGHβ€”0
CVE-2026-21373

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

7.8HIGHβ€”0
CVE-2026-21374

Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.

7.8HIGHβ€”0
CVE-2026-21375

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

7.8HIGHβ€”0
CVE-2026-21380

Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memory.

7.8HIGHβ€”0
CVE-2026-23657

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

7.8HIGHβ€”0
CVE-2026-26184

Buffer over-read in Windows Projected File System allows an authorized attacker to elevate privileges locally.

7.8HIGHβ€”0
CVE-2026-26176

Heap-based buffer overflow in Windows Client Side Caching driver (csc.sys) allows an authorized attacker to elevate privileges locally.

7.8HIGHβ€”0
CVE-2026-27907

Integer underflow (wrap or wraparound) in Windows Storage Spaces Controller allows an authorized attacker to elevate privileges locally.

7.8HIGHβ€”0
CVE-2026-27289

Photoshop Desktop versions 27.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure....

7.8HIGHβ€”0
CVE-2026-32189

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

7.8HIGHβ€”0
CVE-2026-33632

ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to version 4.2.4, two file operation event types β€” ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVE...

7.8HIGHβ€”0
CVE-2026-26180

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.

7.8HIGHβ€”0
CVE-2026-27311

Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of ...

7.8HIGHβ€”0
CVE-2026-27312

Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of ...

7.8HIGHβ€”0
CVE-2026-26183

Improper access control in Windows RPC API allows an authorized attacker to elevate privileges locally.

7.8HIGHβ€”0
CVE-2026-34631

InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this iss...

7.8HIGHβ€”0
CVE-2026-40527

radare2 prior to commit bc5a890 contains a command injection vulnerability in the afsv/afsvj command path where crafted ELF binaries can embed malicious r2 command sequences as DWARF DW_TAG_formal_par...

7.8HIGHβ€”0
CVE-2026-27909

Use after free in Microsoft Windows Search Component allows an authorized attacker to elevate privileges locally.

7.8HIGHβ€”0
CVE-2026-27910

Improper handling of insufficient permissions or privileges in Windows Installer allows an authorized attacker to elevate privileges locally.

7.8HIGHβ€”0
CVE-2026-27292

Adobe Framemaker versions 2022.8 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue...

7.8HIGHβ€”0
CVE-2026-27284

InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory str...

7.8HIGHβ€”0
CVE-2026-27283

InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this...

7.8HIGHβ€”0
CVE-2026-27238

InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploita...

7.8HIGHβ€”0
Pagina 29 de 121

This product uses data from the NVD API but is not endorsed or certified by the NVD.