Export limit exceeded: 346723 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 346723 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 18051 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (18051 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2021-33114 | 2 Intel, Microsoft | 17 Ac 1550 Firmware, Ac 3165 Firmware, Ac 3168 Firmware and 14 more | 2025-05-05 | 5.7 Medium |
| Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an authenticated user to potentially enable denial of service via adjacent access. | ||||
| CVE-2021-33113 | 2 Intel, Microsoft | 17 Ac 1550 Firmware, Ac 3165 Firmware, Ac 3168 Firmware and 14 more | 2025-05-05 | 8.1 High |
| Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access. | ||||
| CVE-2021-33110 | 2 Intel, Microsoft | 17 Ac 1550 Firmware, Ac 3165 Firmware, Ac 3168 Firmware and 14 more | 2025-05-05 | 6.5 Medium |
| Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | ||||
| CVE-2021-0076 | 2 Intel, Microsoft | 45 Amt Ac 8260, Amt Ac 8260 Firmware, Amt Ac 8265 and 42 more | 2025-05-05 | 5.5 Medium |
| Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access. | ||||
| CVE-2021-0072 | 2 Intel, Microsoft | 45 Amt Ac 8260, Amt Ac 8260 Firmware, Amt Ac 8265 and 42 more | 2025-05-05 | 5.5 Medium |
| Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable information disclosure via local access. | ||||
| CVE-2021-0066 | 2 Intel, Microsoft | 45 Amt Ac 8260, Amt Ac 8260 Firmware, Amt Ac 8265 and 42 more | 2025-05-05 | 8.4 High |
| Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access. | ||||
| CVE-2020-9676 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.3 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
| CVE-2020-9675 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.3 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
| CVE-2020-9674 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.3 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
| CVE-2020-9569 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
| CVE-2020-9568 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
| CVE-2020-9567 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
| CVE-2020-9566 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
| CVE-2020-9565 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
| CVE-2020-9564 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
| CVE-2020-9563 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
| CVE-2020-9562 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||
| CVE-2020-9561 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
| CVE-2020-9560 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||
| CVE-2020-9559 | 2 Adobe, Microsoft | 2 Bridge, Windows | 2025-05-05 | 7.8 High |
| Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . | ||||