318 CVEs tracked today. 30 Critical, 133 High, 136 Medium, 11 Low.
-
CVE-2025-45858
CRITICAL
CVSS 9.8
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a command injection vulnerability via the FUN_00459fdc function. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 15.4%.
Command Injection
A3002r Firmware
TOTOLINK
-
CVE-2025-45865
CRITICAL
CVSS 9.8
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the dnsaddr parameter in the formDhcpv6s interface. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
A3002r Firmware
TOTOLINK
-
CVE-2025-45863
CRITICAL
CVSS 9.8
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the macstr parameter in the formMapDelDevice interface. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
A3002r Firmware
TOTOLINK
-
CVE-2025-45861
CRITICAL
CVSS 9.8
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the routername parameter in the formDnsv6 interface. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
A3002r Firmware
TOTOLINK
-
CVE-2025-45857
CRITICAL
CVSS 9.8
EDIMAX CV7428NS v1.20 was discovered to contain a remote code execution (RCE) vulnerability via the command parameter in the mp function. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
RCE
Code Injection
Cv 7428Ns Firmware
-
CVE-2025-44831
CRITICAL
CVSS 9.8
EngineerCMS v1.02 through v2.0.5 has a SQL injection vulnerability in the /project/addproject interface. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Engineercms
-
CVE-2025-43561
CRITICAL
CVSS 9.1
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Incorrect Authorization vulnerability that could result in arbitrary code execution in the context of the current user. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
RCE
Authentication Bypass
Coldfusion
-
CVE-2025-43560
CRITICAL
CVSS 9.1
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. Epss exploitation probability 12.1% and no vendor patch available.
RCE
Coldfusion
-
CVE-2025-43559
CRITICAL
CVSS 9.1
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. Epss exploitation probability 12.3% and no vendor patch available.
RCE
Coldfusion
-
CVE-2025-42999
CRITICAL
CVSS 9.1
SAP NetWeaver Visual Composer allows privileged users to upload untrusted content that is deserialized on the server, enabling remote code execution. Companion to CVE-2025-31324.
Sap
Deserialization
Netweaver
-
CVE-2025-32756
CRITICAL
CVSS 9.8
Fortinet FortiCamera, FortiMail, FortiNDR, FortiRecorder, and FortiVoice contain a stack-based buffer overflow enabling unauthenticated remote code execution across multiple Fortinet products.
Buffer Overflow
RCE
Stack Overflow
Fortinet
Fortimail
-
CVE-2025-32709
HIGH
CVSS 7.8
Windows Ancillary Function Driver for WinSock contains a use-after-free enabling local privilege escalation through a null pointer dereference, exploited in May 2025.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 1507
-
CVE-2025-32706
HIGH
CVSS 7.8
Windows CLFS Driver contains an input validation flaw enabling local privilege escalation, yet another CLFS kernel vulnerability in the May 2025 Patch Tuesday.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-32701
HIGH
CVSS 7.8
Windows Common Log File System Driver contains another use-after-free for local privilege escalation, the latest in a series of CLFS kernel vulnerabilities exploited throughout 2023-2025.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 1507
-
CVE-2025-30400
HIGH
CVSS 7.8
Windows Desktop Window Manager (DWM) contains a use-after-free enabling local privilege escalation, exploited in the wild in May 2025 as another DWM zero-day.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 1809
-
CVE-2025-30397
HIGH
CVSS 7.5
Microsoft Scripting Engine contains a type confusion vulnerability allowing unauthorized remote code execution over the network through crafted content processed by the scripting engine.
Microsoft
Memory Corruption
Authentication Bypass
Windows 10 1507
Windows 10 1607
-
CVE-2025-28056
CRITICAL
CVSS 9.8
rebuild v3.9.0 through v3.9.3 has a SQL injection vulnerability in /admin/admin-cli/exec component. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Rebuild
-
CVE-2025-26677
HIGH
CVSS 7.5
Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 37.9% and no vendor patch available.
Denial Of Service
Windows Server 2016
Windows Server 2019
Windows Server 2022
Windows Server 2022 23h2
-
CVE-2025-22462
CRITICAL
CVSS 9.8
An authentication bypass in Ivanti Neurons for ITSM (on-prem only) before 2023.4, 2024.2 and 2024.3 with the May 2025 Security Patch allows a remote unauthenticated attacker to gain administrative. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Ivanti
Neurons For Itsm
-
CVE-2025-4658
CRITICAL
CVSS 9.3
Versions of OpenPubkey library prior to 0.10.0 contained a vulnerability that would allow a specially crafted JWS to bypass signature verification. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Openpubkey
Opkssh
Suse
-
CVE-2025-4632
CRITICAL
CVSS 9.8
Samsung MagicINFO 9 Server contains a path traversal vulnerability allowing unauthenticated attackers to write arbitrary files as SYSTEM authority, enabling complete server compromise.
Samsung
Path Traversal
Magicinfo 9 Server
-
CVE-2025-4428
HIGH
CVSS 7.2
Ivanti Endpoint Manager Mobile (EPMM) contains an authenticated code injection in the API component, allowing authenticated attackers to execute arbitrary code through crafted API requests.
RCE
Code Injection
Ivanti
Endpoint Manager Mobile
-
CVE-2025-4396
HIGH
CVSS 7.5
The Relevanssi - A Better Search plugin for WordPress is vulnerable to time-based SQL Injection via the cats and tags query parameters in all versions up to, and including, 4.24.4 (Free) and <=. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 25.2% and no vendor patch available.
WordPress
SQLi
-
CVE-2025-3757
CRITICAL
CVSS 9.3
Versions of OpenPubkey library prior to 0.10.0 contained a vulnerability that would allow a specially crafted JWS to bypass signature verification. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
Openpubkey
Suse
-
CVE-2024-46506
CRITICAL
CVSS 10.0
NetAlertX (formerly PiAlert) versions 23.01.14 through 24.x before 24.10.12 allow unauthenticated command injection through the settings update API. The savesettings function lacks authentication, enabling attackers to modify arbitrary configuration values and inject OS commands that execute on the host system.
Command Injection
PHP
Authentication Bypass
Netalertx
-
CVE-2025-43567
CRITICAL
CVSS 9.3
Adobe Connect versions 12.8 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Adobe
XSS
Connect
-
CVE-2025-43564
CRITICAL
CVSS 9.1
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
Authentication Bypass
Coldfusion
-
CVE-2025-43563
CRITICAL
CVSS 9.1
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
Authentication Bypass
Coldfusion
-
CVE-2025-43562
CRITICAL
CVSS 9.1
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could result. Rated critical severity (CVSS 9.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
RCE
Coldfusion
-
CVE-2025-40628
CRITICAL
CVSS 9.3
SQL injection vulnerability in DomainsPRO 1.2. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
PHP
SQLi
-
CVE-2025-33025
CRITICAL
CVSS 9.4
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.5), RUGGEDCOM ROX MX5000RE (All versions < V2.16.5), RUGGEDCOM ROX RX1400 (All versions < V2.16.5), RUGGEDCOM ROX. Rated critical severity (CVSS 9.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
RCE
-
CVE-2025-33024
CRITICAL
CVSS 9.4
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.5), RUGGEDCOM ROX MX5000RE (All versions < V2.16.5), RUGGEDCOM ROX RX1400 (All versions < V2.16.5), RUGGEDCOM ROX. Rated critical severity (CVSS 9.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
RCE
-
CVE-2025-32469
CRITICAL
CVSS 9.4
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.16.5), RUGGEDCOM ROX MX5000RE (All versions < V2.16.5), RUGGEDCOM ROX RX1400 (All versions < V2.16.5), RUGGEDCOM ROX. Rated critical severity (CVSS 9.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Command Injection
RCE
-
CVE-2025-30387
CRITICAL
CVSS 9.8
Improper limitation of a pathname to a restricted directory ('path traversal') in Azure allows an unauthorized attacker to elevate privileges over a network. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Path Traversal
Azure Ai Document Intelligence Studio
-
CVE-2025-30012
CRITICAL
CVSS 10.0
The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component, which allows an unauthenticated attacker to send malicious payload request in a. Rated critical severity (CVSS 10.0), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Sap
Command Injection
Deserialization
Java
Supplier Relationship Management
-
CVE-2025-26390
CRITICAL
CVSS 9.3
A vulnerability has been identified in OZW672 (All versions < V6.0), OZW772 (All versions < V6.0). Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
SQLi
Ozw672 Firmware
Ozw772 Firmware
-
CVE-2025-26389
CRITICAL
CVSS 10.0
A vulnerability has been identified in OZW672 (All versions < V8.0), OZW772 (All versions < V8.0). Rated critical severity (CVSS 10.0), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Command Injection
RCE
Ozw672 Firmware
Ozw772 Firmware
-
CVE-2025-22248
CRITICAL
CVSS 9.4
The bitnami/pgpool Docker image, and the bitnami/postgres-ha k8s chart, under default configurations, comes with an 'repmgr' user that allows unauthenticated access to the database inside the. Rated critical severity (CVSS 9.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
PostgreSQL
Information Disclosure
Kubernetes
Docker
Bitnami
-
CVE-2025-47276
HIGH
CVSS 7.5
Actualizer is a single shell script solution to allow developers and embedded engineers to create Debian operating systems (OS). Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
OpenSSL
Information Disclosure
Debian
-
CVE-2025-43572
HIGH
CVSS 7.8
Dimension versions 4.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Dimension
-
CVE-2025-43571
HIGH
CVSS 7.8
Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
RCE
Denial Of Service
Substance 3d Stager
-
CVE-2025-43570
HIGH
CVSS 7.8
Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
RCE
Denial Of Service
Substance 3d Stager
-
CVE-2025-43569
HIGH
CVSS 7.8
Substance3D - Stager versions 3.1.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Substance 3d Stager
-
CVE-2025-43568
HIGH
CVSS 7.8
Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
RCE
Denial Of Service
Substance 3d Stager
-
CVE-2025-43565
HIGH
CVSS 8.4
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Incorrect Authorization vulnerability that could lead to arbitrary code execution in the context of the current user. Rated high severity (CVSS 8.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
RCE
Authentication Bypass
Coldfusion
-
CVE-2025-43557
HIGH
CVSS 7.8
Animate versions 24.0.8, 23.0.11 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
RCE
Animate
-
CVE-2025-43556
HIGH
CVSS 7.8
Animate versions 24.0.8, 23.0.11 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Integer Overflow
RCE
Animate
-
CVE-2025-43555
HIGH
CVSS 7.8
Animate versions 24.0.8, 23.0.11 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Integer Overflow
RCE
Animate
-
CVE-2025-43554
HIGH
CVSS 7.8
Substance3D - Modeler versions 1.21.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Substance 3d Modeler
-
CVE-2025-43553
HIGH
CVSS 7.8
Substance3D - Modeler versions 1.21.0 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
RCE
Substance 3d Modeler
-
CVE-2025-43549
HIGH
CVSS 7.8
Substance3D - Stager versions 3.1.1 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
RCE
Denial Of Service
Substance 3d Stager
-
CVE-2025-43548
HIGH
CVSS 7.8
Dimension versions 4.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Dimension
-
CVE-2025-43547
HIGH
CVSS 7.8
Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Integer Overflow
RCE
Bridge
-
CVE-2025-43546
HIGH
CVSS 7.8
Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Integer Overflow
RCE
Bridge
-
CVE-2025-43545
HIGH
CVSS 7.8
Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
RCE
Bridge
-
CVE-2025-43011
HIGH
CVSS 7.7
Under certain conditions, SAP Landscape Transformation's PCL Basis module does not perform the necessary authorization checks, allowing authenticated users to access restricted functionalities or. Rated high severity (CVSS 7.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Authentication Bypass
-
CVE-2025-43010
HIGH
CVSS 8.3
SAP S/4HANA Cloud Private Edition or on Premise (SCM Master Data Layer (MDL)) allows an authenticated attacker with SAP standard authorization to execute a certain function module remotely and. Rated high severity (CVSS 8.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
RCE
Code Injection
Sap
-
CVE-2025-43000
HIGH
CVSS 7.9
Under certain conditions Promotion Management Wizard (PMW) allows an attacker to access information which would otherwise be restricted.This has High impact on Confidentiality with Low impact on. Rated high severity (CVSS 7.9), this vulnerability is low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-41645
HIGH
CVSS 8.6
An unauthenticated remote attacker could use a demo account of the portal to hijack devices that were created in that account by mistake. Rated high severity (CVSS 8.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-40582
HIGH
CVSS 8.5
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Rated high severity (CVSS 8.5), this vulnerability is low attack complexity. No vendor patch available.
Command Injection
Siemens
Scalance Lpe9403 Firmware
-
CVE-2025-40581
HIGH
CVSS 8.4
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Rated high severity (CVSS 8.4), this vulnerability is low attack complexity. No vendor patch available.
Authentication Bypass
Siemens
Scalance Lpe9403 Firmware
-
CVE-2025-40574
HIGH
CVSS 8.5
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Rated high severity (CVSS 8.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Siemens
Scalance Lpe9403 Firmware
-
CVE-2025-40566
HIGH
CVSS 8.7
A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions < V4.1 Update 3), SIMATIC PCS neo V5.0 (All versions < V5.0 Update 1). Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Simatic Pcs Neo
-
CVE-2025-40556
HIGH
CVSS 7.1
A vulnerability has been identified in BACnet ATEC 550-440 (All versions), BACnet ATEC 550-441 (All versions), BACnet ATEC 550-445 (All versions), BACnet ATEC 550-446 (All versions). Rated high severity (CVSS 7.1), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
-
CVE-2025-35471
HIGH
CVSS 7.0
conda-forge openssl-feedstock before 066e83c (2024-05-20), on Microsoft Windows, configures OpenSSL to use an OPENSSLDIR file path that can be written to by non-privilged local users. Rated high severity (CVSS 7.0), this vulnerability is low attack complexity. Public exploit code available.
Microsoft
OpenSSL
RCE
Miniforge
Openssl Feedstock
-
CVE-2025-32707
HIGH
CVSS 7.8
Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-32705
HIGH
CVSS 7.8
Out-of-bounds read in Microsoft Office Outlook allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
365 Apps
Office Long Term Servicing Channel
-
CVE-2025-32704
HIGH
CVSS 8.4
Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 8.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
365 Apps
Excel
Office
-
CVE-2025-32702
HIGH
CVSS 7.8
Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Command Injection
Visual Studio 2019
Visual Studio 2022
-
CVE-2025-32454
HIGH
CVSS 7.3
A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions < V14.3.0.14), Teamcenter Visualization V2312 (All versions < V2312.0010), Teamcenter Visualization V2406 (All. Rated high severity (CVSS 7.3), this vulnerability is no authentication required. No vendor patch available.
Information Disclosure
Buffer Overflow
Teamcenter Visualization
Tecnomatix Plant Simulation
-
CVE-2025-31930
HIGH
CVSS 8.7
A vulnerability has been identified in IEC 1Ph 7.4kW Child socket (8EM1310-2EH04-0GA0) (All versions < V2.135), IEC 1Ph 7.4kW Child socket/ shutter (8EM1310-2EN04-0GA0) (All versions < V2.135), IEC. Rated high severity (CVSS 8.7), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-30393
HIGH
CVSS 7.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-30388
HIGH
CVSS 7.8
Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Office
Office Long Term Servicing Channel
-
CVE-2025-30386
HIGH
CVSS 8.4
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 8.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-30385
HIGH
CVSS 7.8
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 10 1607
-
CVE-2025-30384
HIGH
CVSS 7.4
Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.4), this vulnerability is no authentication required. No vendor patch available.
Microsoft
Deserialization
Sharepoint Server
-
CVE-2025-30383
HIGH
CVSS 7.8
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Memory Corruption
Authentication Bypass
365 Apps
Excel
-
CVE-2025-30382
HIGH
CVSS 7.8
Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Deserialization
Sharepoint Server
-
CVE-2025-30381
HIGH
CVSS 7.8
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
365 Apps
Excel
-
CVE-2025-30379
HIGH
CVSS 7.8
Release of invalid pointer or reference in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
365 Apps
Excel
Office
-
CVE-2025-30378
HIGH
CVSS 7.0
Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.0), this vulnerability is no authentication required. No vendor patch available.
Microsoft
Deserialization
Sharepoint Server
-
CVE-2025-30377
HIGH
CVSS 8.4
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 8.4), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-30376
HIGH
CVSS 7.8
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
365 Apps
Excel
-
CVE-2025-30375
HIGH
CVSS 7.8
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Memory Corruption
Authentication Bypass
365 Apps
Excel
-
CVE-2025-30330
HIGH
CVSS 7.8
Illustrator versions 29.3, 28.7.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
RCE
Illustrator
-
CVE-2025-30328
HIGH
CVSS 7.8
Animate versions 24.0.8, 23.0.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Animate
-
CVE-2025-30326
HIGH
CVSS 7.8
Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
RCE
Photoshop
-
CVE-2025-30325
HIGH
CVSS 7.8
Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Integer Overflow
RCE
Photoshop
-
CVE-2025-30324
HIGH
CVSS 7.8
Photoshop Desktop versions 26.5, 25.12.2 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Integer Overflow
RCE
Photoshop
-
CVE-2025-30322
HIGH
CVSS 7.8
Substance3D - Painter versions 11.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Substance 3d Painter
-
CVE-2025-30318
HIGH
CVSS 7.8
InDesign Desktop versions ID19.5.2, ID20.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Indesign
-
CVE-2025-30310
HIGH
CVSS 7.8
Dreamweaver Desktop versions 21.4 and earlier are affected by an Access of Resource Using Incompatible Type ('Type Confusion') vulnerability that could result in arbitrary code execution in the. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
RCE
Dreamweaver
-
CVE-2025-30176
HIGH
CVSS 8.7
A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SINEC NMS (All versions < V4.0), SINEMA Remote Connect (All versions), Totally. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Denial Of Service
Simatic Pcs Neo
Sinec Nms
-
CVE-2025-30175
HIGH
CVSS 8.7
A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SINEC NMS (All versions < V4.0), SINEMA Remote Connect (All versions), Totally. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Denial Of Service
Simatic Pcs Neo
Sinec Nms
-
CVE-2025-30174
HIGH
CVSS 8.7
A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SINEC NMS (All versions < V4.0), SINEMA Remote Connect (All versions), Totally. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Denial Of Service
Sinec Nms
Sinema Remote Connect
-
CVE-2025-30018
HIGH
CVSS 8.6
The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) allows an unauthenticated attacker to submit an application servlet request with a crafted XML file which when parsed, enables. Rated high severity (CVSS 8.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
XXE
Sap
Supplier Relationship Management
-
CVE-2025-29979
HIGH
CVSS 7.8
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
365 Apps
Excel
-
CVE-2025-29978
HIGH
CVSS 7.8
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-29977
HIGH
CVSS 7.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
365 Apps
-
CVE-2025-29976
HIGH
CVSS 7.8
Improper privilege management in Microsoft Office SharePoint allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Privilege Escalation
Sharepoint Server
-
CVE-2025-29975
HIGH
CVSS 7.8
Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Pc Manager
-
CVE-2025-29973
HIGH
CVSS 7.0
Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Microsoft
Authentication Bypass
Azure File Sync
-
CVE-2025-29971
HIGH
CVSS 7.5
Out-of-bounds read in Web Threat Defense (WTD.sys) allows an unauthorized attacker to deny service over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Windows 11 22h2
Windows 11 23h2
Windows 11 24h2
-
CVE-2025-29970
HIGH
CVSS 7.8
Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Microsoft
Denial Of Service
Windows 11 24h2
-
CVE-2025-29969
HIGH
CVSS 7.5
Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29967
HIGH
CVSS 8.8
Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
Heap Overflow
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29966
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Remote Desktop
Windows App
-
CVE-2025-29964
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1809
Windows 10 21h2
-
CVE-2025-29963
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1809
Windows 10 21h2
-
CVE-2025-29962
HIGH
CVSS 8.8
Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-29842
HIGH
CVSS 7.5
Acceptance of extraneous untrusted data with trusted data in UrlMon allows an unauthorized attacker to bypass a security feature over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Authentication Bypass
Windows 10 1507
Windows 10 1607
Windows 10 1809
Windows 10 21h2
-
CVE-2025-29841
HIGH
CVSS 7.0
Concurrent execution using shared resource with improper synchronization ('race condition') in Universal Print Management Service allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Information Disclosure
Race Condition
Windows 10 21h2
Windows 10 22h2
Windows 11 22h2
-
CVE-2025-29840
HIGH
CVSS 8.8
Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Stack Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-29838
HIGH
CVSS 7.4
Null pointer dereference in Windows Drivers allows an unauthorized attacker to elevate privileges locally. Rated high severity (CVSS 7.4), this vulnerability is no authentication required. No vendor patch available.
Microsoft
Null Pointer Dereference
Denial Of Service
Windows 11 24h2
Windows Server 2025
-
CVE-2025-29833
HIGH
CVSS 7.7
Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally. Rated high severity (CVSS 7.7), this vulnerability is no authentication required. No vendor patch available.
Microsoft
Authentication Bypass
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29831
HIGH
CVSS 7.5
Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Use After Free
Memory Corruption
Denial Of Service
Windows Server 2008
Windows Server 2012
-
CVE-2025-29826
HIGH
CVSS 7.3
Improper handling of insufficient permissions or privileges in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Dataverse
-
CVE-2025-28057
HIGH
CVSS 7.2
owl-admin v3.2.2~ to v4.10.2 is vulnerable to SQL Injection in /admin-api/system/admin_menus/save_order. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.
SQLi
Owl Admin
-
CVE-2025-28055
HIGH
CVSS 7.5
upset-gal-web v7.1.0 /api/music/v1/cover.ts contains an arbitrary file read vulnerabilit. Rated high severity (CVSS 7.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Path Traversal
Upset Gal Web
-
CVE-2025-27468
HIGH
CVSS 7.0
Improper privilege management in Windows Secure Kernel Mode allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.0). No vendor patch available.
Microsoft
Privilege Escalation
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27197
HIGH
CVSS 7.8
Lightroom Desktop versions 8.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
RCE
Lightroom
-
CVE-2025-26646
HIGH
CVSS 8.0
External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network. Rated high severity (CVSS 8.0), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
Build Tools
Visual Studio 2022
Net
Redhat
-
CVE-2025-24510
HIGH
CVSS 7.1
A vulnerability has been identified in MS/TP Point Pickup Module (All versions). Rated high severity (CVSS 7.1), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
-
CVE-2025-24308
HIGH
CVSS 8.7
Improper input validation in the UEFI firmware error handler for the Intel(R) Server D50DNP and M50FCP may allow a privileged user to potentially enable escalation of privilege via local access. Rated high severity (CVSS 8.7). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-24063
HIGH
CVSS 7.8
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Buffer Overflow
Heap Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-24009
HIGH
CVSS 8.2
A vulnerability has been identified in SIRIUS 3RK3 Modular Safety System (MSS) (All versions), SIRIUS Safety Relays 3SK2 (All versions). Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
-
CVE-2025-24008
HIGH
CVSS 8.7
A vulnerability has been identified in SIRIUS 3RK3 Modular Safety System (MSS) (All versions), SIRIUS Safety Relays 3SK2 (All versions). Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-24007
HIGH
CVSS 8.7
A vulnerability has been identified in SIRIUS 3RK3 Modular Safety System (MSS) (All versions), SIRIUS Safety Relays 3SK2 (All versions). Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
-
CVE-2025-22892
HIGH
CVSS 7.1
Uncontrolled resource consumption for some OpenVINO™ model server software maintained by Intel(R) before version 2024.4 may allow an unauthenticated user to potentially enable denial of service via. Rated high severity (CVSS 7.1), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Intel
Denial Of Service
-
CVE-2025-22843
HIGH
CVSS 8.8
Incorrect execution-assigned permissions for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via local. Rated high severity (CVSS 8.8). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-22460
HIGH
CVSS 7.8
Default credentials in Ivanti Cloud Services Application before version 5.0.5 allows a local authenticated attacker to escalate their privileges. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.
Ivanti
Privilege Escalation
Cloud Services Appliance
-
CVE-2025-22249
HIGH
CVSS 8.2
VMware Aria automation contains a DOM based Cross-Site Scripting (XSS) vulnerability. Rated high severity (CVSS 8.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity.
XSS
VMware
Aria Automation
Cloud Foundation
Telco Cloud Platform
-
CVE-2025-21264
HIGH
CVSS 7.1
Files or directories accessible to external parties in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally. Rated high severity (CVSS 7.1), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Path Traversal
Visual Studio Code
-
CVE-2025-21094
HIGH
CVSS 8.7
Improper input validation in the UEFI firmware DXE module for the Intel(R) Server D50DNP and M50FCP boards may allow a privileged user to potentially enable escalation of privilege via local access. Rated high severity (CVSS 8.7), this vulnerability is low attack complexity. No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20618
HIGH
CVSS 8.3
Stack-based buffer overflow for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow a privileged user to potentially enable denial of service via local access. Rated high severity (CVSS 8.3), this vulnerability is low attack complexity. No vendor patch available.
Stack Overflow
Intel
Buffer Overflow
Denial Of Service
Microsoft
-
CVE-2025-20100
HIGH
CVSS 8.7
Improper access control in the memory controller configurations for some Intel(R) Xeon(R) 6 processor with E-cores may allow a privileged user to potentially enable escalation of privilege via local. Rated high severity (CVSS 8.7). No vendor patch available.
Intel
Authentication Bypass
Privilege Escalation
-
CVE-2025-20083
HIGH
CVSS 7.1
Improper authentication in the firmware for the Intel(R) Slim Bootloader may allow a privileged user to potentially enable escalation of privilege via local access. Rated high severity (CVSS 7.1). No vendor patch available.
Intel
Authentication Bypass
Privilege Escalation
-
CVE-2025-20082
HIGH
CVSS 8.7
Time-of-check time-of-use race condition in the UEFI firmware SmiVariable driver for the Intel(R) Server D50DNP and M50FCP boards may allow a privileged user to enable escalation of privilege via. Rated high severity (CVSS 8.7). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20062
HIGH
CVSS 7.0
Use after free for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Rated high severity (CVSS 7.0), this vulnerability is no authentication required. No vendor patch available.
Use After Free
Memory Corruption
Intel
Denial Of Service
Microsoft
-
CVE-2025-20046
HIGH
CVSS 7.2
Use after free for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Rated high severity (CVSS 7.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Intel
Denial Of Service
Microsoft
-
CVE-2025-20032
HIGH
CVSS 8.3
Improper input validation for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow a privileged user to potentially enable denial of service via local access. Rated high severity (CVSS 8.3), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Intel
Denial Of Service
Proset Wireless Wifi
Windows
-
CVE-2025-20026
HIGH
CVSS 7.0
Out-of-bounds read for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Rated high severity (CVSS 7.0), this vulnerability is no authentication required. No vendor patch available.
Information Disclosure
Intel
Buffer Overflow
Denial Of Service
Microsoft
-
CVE-2025-20006
HIGH
CVSS 8.3
Use after free for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Rated high severity (CVSS 8.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Use After Free
Memory Corruption
Intel
Denial Of Service
Microsoft
-
CVE-2025-20004
HIGH
CVSS 8.5
Insufficient control flow management in the Alias Checking Trusted Module for some Intel(R) Xeon(R) 6 processor E-Cores firmware may allow a privileged user to potentially enable escalation of. Rated high severity (CVSS 8.5). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20003
HIGH
CVSS 7.3
Improper link resolution before file access ('Link Following') for some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-4660
HIGH
CVSS 8.7
A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Microsoft
RCE
Privilege Escalation
Secureconnector
Windows
-
CVE-2025-4648
HIGH
CVSS 8.4
The content of a SVG file, received as input in Centreon web, was not properly checked. Rated high severity (CVSS 8.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
File Upload
Centreon Web
-
CVE-2025-4647
HIGH
CVSS 8.4
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon web allows Reflected XSS. Rated high severity (CVSS 8.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
Centreon Web
-
CVE-2025-4646
HIGH
CVSS 7.2
Incorrect Authorization vulnerability in Centreon web (API Token creation form modules) allows Privilege Escalation.04.0 before 24.04.10, from 24.10.0 before 24.10.4. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
Privilege Escalation
Centreon Web
-
CVE-2025-4474
HIGH
CVSS 8.8
The Frontend Dashboard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the fed_admin_setting_form_function() function in versions 1.0 to 2.2.7. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
Authentication Bypass
Privilege Escalation
PHP
-
CVE-2025-4473
HIGH
CVSS 8.8
The Frontend Dashboard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ajax_request() function in versions 1.0 to 2.2.7. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
Authentication Bypass
Privilege Escalation
PHP
-
CVE-2025-4317
HIGH
CVSS 8.8
The TheGem theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the thegem_get_logo_url() function in all versions up to, and including, 5.10.3. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
RCE
File Upload
PHP
-
CVE-2025-3744
HIGH
CVSS 7.6
Nomad Enterprise (“Nomad”) jobs using the policy override option are bypassing the mandatory sentinel policies. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Authentication Bypass
Nomad
-
CVE-2025-0035
HIGH
CVSS 7.3
Unquoted search path within AMD Cloud Manageability Service can allow a local attacker to escalate privileges, potentially resulting in arbitrary code execution. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.
Amd
RCE
-
CVE-2024-51445
HIGH
CVSS 7.1
A vulnerability has been identified in Polarion V2310 (All versions), Polarion V2404 (All versions < V2404.4). Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XXE
Polarion Alm
-
CVE-2024-51444
HIGH
CVSS 7.1
A vulnerability has been identified in Polarion V2310 (All versions), Polarion V2404 (All versions < V2404.4). Rated high severity (CVSS 7.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
SQLi
Polarion Alm
-
CVE-2024-48766
HIGH
CVSS 8.6
NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in. Rated high severity (CVSS 8.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 75.0%.
PHP
Path Traversal
Netalertx
-
CVE-2024-42446
HIGH
CVSS 7.5
APTIOV contains a vulnerability in BIOS where an attacker may cause a Time-of-check Time-of-use (TOCTOU) Race Condition by local means. Rated high severity (CVSS 7.5). No vendor patch available.
RCE
Aptio V
-
CVE-2024-36339
HIGH
CVSS 7.3
A DLL hijacking vulnerability in the AMD Optimizing CPU Libraries could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.
Amd
RCE
Privilege Escalation
-
CVE-2024-36321
HIGH
CVSS 7.3
Unquoted search path within AIM-T Manageability Service can allow a local attacker to escalate privileges, potentially resulting in arbitrary code execution. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.
RCE
-
CVE-2024-36292
HIGH
CVSS 8.2
Improper buffer restrictions for some Intel(R) Data Center GPU Flex Series for Windows driver before version 31.0.101.4314 may allow an authenticated user to potentially enable denial of service via. Rated high severity (CVSS 8.2), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Intel
Buffer Overflow
Denial Of Service
Windows
-
CVE-2024-23815
HIGH
CVSS 8.7
A vulnerability has been identified in Desigo CC (All versions if access from Installed Clients to Desigo CC server is allowed from networks outside of a highly protected zone), Desigo CC (All. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2024-21960
HIGH
CVSS 7.3
Incorrect default permissions in the AMD Optimizing CPU Libraries (AOCL) installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. No vendor patch available.
Amd
RCE
Privilege Escalation
-
CVE-2025-47905
MEDIUM
CVSS 5.4
Varnish Cache before 7.6.3 and 7.7 before 7.7.1, and Varnish Enterprise before 6.0.13r14, allow client-side desync via HTTP/1 requests, because the product incorrectly permits CRLF to be skipped to. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
Request Smuggling
Redhat
Suse
-
CVE-2025-47204
MEDIUM
CVSS 6.1
An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Cross-Site Request Forgery (CSRF) vulnerability could allow attackers to trick authenticated users into performing unintended actions.
PHP
CSRF
XSS
Bootstrap Multiselect
-
CVE-2025-46721
MEDIUM
CVSS 6.0
nosurf is cross-site request forgery (CSRF) protection middleware for Go. Rated medium severity (CVSS 6.0), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.
CSRF
XSS
Nosurf
Suse
-
CVE-2025-45867
MEDIUM
CVSS 5.4
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the static_dns1 parameter in the formIpv6Setup interface. Rated medium severity (CVSS 5.4), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
Stack Overflow
A3002r Firmware
TOTOLINK
-
CVE-2025-45866
MEDIUM
CVSS 5.4
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the addrPoolEnd parameter in the formDhcpv6s interface. Rated medium severity (CVSS 5.4), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
A3002r Firmware
TOTOLINK
-
CVE-2025-45864
MEDIUM
CVSS 5.4
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the addrPoolStart parameter in the formDhcpv6s interface. Rated medium severity (CVSS 5.4), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
A3002r Firmware
TOTOLINK
-
CVE-2025-45859
MEDIUM
CVSS 5.4
TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the bandstr parameter in the formMapDelDevice interface. Rated medium severity (CVSS 5.4), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Buffer Overflow
A3002r Firmware
TOTOLINK
-
CVE-2025-45746
MEDIUM
CVSS 6.5
In ZKT ZKBio CVSecurity 6.4.1_R an unauthenticated attacker can craft JWT token using the hardcoded secret to authenticate to the service console. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Information Disclosure
Zkbio Cvsecurity
-
CVE-2025-44039
MEDIUM
CVSS 5.1
CP-XR-DE21-S -4G Router Firmware version 1.031.022 was discovered to contain insecure protections for its UART console. Rated medium severity (CVSS 5.1), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Cp Xr De21 S Firmware
-
CVE-2025-43566
MEDIUM
CVSS 6.8
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary. Rated medium severity (CVSS 6.8), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Path Traversal
Coldfusion
-
CVE-2025-43551
MEDIUM
CVSS 5.5
Substance3D - Stager versions 3.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Substance 3d Stager
-
CVE-2025-43009
MEDIUM
CVSS 6.3
SAP Service Parts Management (SPM) does not perform necessary authorization checks for an authenticated user, allowing an attacker to escalate privileges. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Authentication Bypass
-
CVE-2025-43008
MEDIUM
CVSS 5.8
Due to missing authorization check, an unauthorized user can view the files of other company. Rated medium severity (CVSS 5.8), this vulnerability is remotely exploitable. No vendor patch available.
Authentication Bypass
-
CVE-2025-43007
MEDIUM
CVSS 6.3
SAP Service Parts Management (SPM) does not perform necessary authorization checks for an authenticated user, allowing an attacker to escalate privileges. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Authentication Bypass
-
CVE-2025-43006
MEDIUM
CVSS 6.1
SAP Supplier Relationship Management (Master Data Management Catalogue) allows an unauthenticated attacker to execute malicious scripts in the application, potentially leading to a Cross-Site. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Sap
XSS
-
CVE-2025-43005
MEDIUM
CVSS 4.3
SAP GUI for Windows allows an unauthenticated attacker to exploit insecure obfuscation algorithms used by the GuiXT application to store user credentials. Rated medium severity (CVSS 4.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Sap
Windows
-
CVE-2025-43004
MEDIUM
CVSS 5.3
Due to a security misconfiguration vulnerability, customers can develop Production Operator Dashboards (PODs) that enable outside users to access customer data when they access these dashboards. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Authentication Bypass
-
CVE-2025-43003
MEDIUM
CVSS 6.4
SAP S/4 HANA allows an authenticated attacker with user privileges to configure a field not intended for their access and create a custom UI layout displaying this field. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable. No vendor patch available.
Sap
Information Disclosure
-
CVE-2025-43002
MEDIUM
CVSS 4.3
SAP S4CORE OData meta-data property allows an authenticated attacker to access restricted information due to missing authorization check. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Information Disclosure
-
CVE-2025-42997
MEDIUM
CVSS 6.6
Under certain conditions, SAP Gateway Client allows a high-privileged user to access restricted information beyond the scope of the application. Rated medium severity (CVSS 6.6), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Information Disclosure
-
CVE-2025-40583
MEDIUM
CVSS 6.7
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Siemens
Scalance Lpe9403 Firmware
-
CVE-2025-40580
MEDIUM
CVSS 5.4
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Rated medium severity (CVSS 5.4). No vendor patch available.
Stack Overflow
Buffer Overflow
RCE
Siemens
Denial Of Service
-
CVE-2025-40579
MEDIUM
CVSS 5.4
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Rated medium severity (CVSS 5.4). No vendor patch available.
Stack Overflow
Buffer Overflow
RCE
Siemens
Denial Of Service
-
CVE-2025-40578
MEDIUM
CVSS 5.3
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions). Rated medium severity (CVSS 5.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Siemens
Scalance Lpe9403 Firmware
-
CVE-2025-40577
MEDIUM
CVSS 5.3
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Rated medium severity (CVSS 5.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Buffer Overflow
Siemens
Scalance Lpe9403 Firmware
-
CVE-2025-40576
MEDIUM
CVSS 5.3
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Rated medium severity (CVSS 5.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Null Pointer Dereference
Siemens
Denial Of Service
Scalance Lpe9403 Firmware
-
CVE-2025-40575
MEDIUM
CVSS 5.3
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Rated medium severity (CVSS 5.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Siemens
Denial Of Service
Scalance Lpe9403 Firmware
-
CVE-2025-40573
MEDIUM
CVSS 6.7
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Path Traversal
Siemens
Scalance Lpe9403 Firmware
-
CVE-2025-40572
MEDIUM
CVSS 6.8
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Rated medium severity (CVSS 6.8), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Siemens
Scalance Lpe9403 Firmware
-
CVE-2025-40555
MEDIUM
CVSS 5.3
A vulnerability has been identified in APOGEE PXC+TALON TC Series (BACnet) (All versions). Rated medium severity (CVSS 5.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Denial Of Service
-
CVE-2025-32917
MEDIUM
CVSS 5.2
Privilege escalation in jar_signature agent plugin in Checkmk versions <2.4.0b7 (beta), <2.3.0p32, <2.2.0p42, and 2.1.0p49 (EOL) allow user with write access to JAVA_HOME/bin directory to escalate. Rated medium severity (CVSS 5.2), this vulnerability is low attack complexity. No vendor patch available.
Privilege Escalation
Checkmk
-
CVE-2025-32703
MEDIUM
CVSS 5.5
Insufficient granularity of access control in Visual Studio allows an authorized attacker to disclose information locally. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Visual Studio 2017
Visual Studio 2019
Visual Studio 2022
-
CVE-2025-31929
MEDIUM
CVSS 4.1
A vulnerability has been identified in IEC 1Ph 7.4kW Child socket (8EM1310-2EH04-0GA0) (All versions), IEC 1Ph 7.4kW Child socket/ shutter (8EM1310-2EN04-0GA0) (All versions), IEC 1Ph 7.4kW Parent. Rated medium severity (CVSS 4.1), this vulnerability is no authentication required. No vendor patch available.
RCE
-
CVE-2025-31493
MEDIUM
CVSS 6.3
Kirby is an open-source content management system. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
PHP
Path Traversal
Kirby
-
CVE-2025-31329
MEDIUM
CVSS 6.2
SAP NetWeaver is vulnerable to an Information Disclosure vulnerability caused by the injection of malicious instructions into user configuration settings. Rated medium severity (CVSS 6.2), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Sap
Information Disclosure
Authentication Bypass
-
CVE-2025-30394
MEDIUM
CVSS 5.9
Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Information Disclosure
Windows Server 2012
Windows Server 2016
Windows Server 2019
Windows Server 2022
-
CVE-2025-30329
MEDIUM
CVSS 5.5
Animate versions 24.0.8, 23.0.11 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Null Pointer Dereference
Denial Of Service
Animate
-
CVE-2025-30320
MEDIUM
CVSS 5.5
InDesign Desktop versions ID19.5.2, ID20.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Null Pointer Dereference
Denial Of Service
Indesign
-
CVE-2025-30319
MEDIUM
CVSS 5.5
InDesign Desktop versions ID19.5.2, ID20.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. Rated medium severity (CVSS 5.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Null Pointer Dereference
Denial Of Service
Indesign
-
CVE-2025-30316
MEDIUM
CVSS 5.4
Adobe Connect versions 12.8 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Adobe
XSS
Connect
-
CVE-2025-30315
MEDIUM
CVSS 6.1
Adobe Connect versions 12.8 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Adobe
XSS
Connect
-
CVE-2025-30314
MEDIUM
CVSS 6.1
Adobe Connect versions 12.8 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Adobe
XSS
Connect
-
CVE-2025-30159
MEDIUM
CVSS 6.3
Kirby is an open-source content management system. Rated medium severity (CVSS 6.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
PHP
Path Traversal
Kirby
-
CVE-2025-30011
MEDIUM
CVSS 5.3
The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM packages which allows an unauthenticated attacker to send an. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Sap
Information Disclosure
Java
Supplier Relationship Management
-
CVE-2025-30010
MEDIUM
CVSS 6.1
The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM packages which allows an unauthenticated attacker to craft a. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Sap
Open Redirect
Java
Supplier Relationship Management
-
CVE-2025-30009
MEDIUM
CVSS 6.1
he Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a deprecated java applet component within the affected SRM packages which allows an unauthenticated attacker to execute. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Sap
XSS
Java
Supplier Relationship Management
-
CVE-2025-29974
MEDIUM
CVSS 5.7
Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network. Rated medium severity (CVSS 5.7), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-29968
MEDIUM
CVSS 6.5
Improper input validation in Active Directory Certificate Services (AD CS) allows an authorized attacker to deny service over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
Windows Server 2008
Windows Server 2012
Windows Server 2016
Windows Server 2019
-
CVE-2025-29961
MEDIUM
CVSS 6.5
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-29960
MEDIUM
CVSS 6.5
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-29959
MEDIUM
CVSS 6.5
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29958
MEDIUM
CVSS 6.5
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29957
MEDIUM
CVSS 6.2
Uncontrolled resource consumption in Windows Deployment Services allows an unauthorized attacker to deny service locally. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Denial Of Service
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29956
MEDIUM
CVSS 5.4
Buffer over-read in Windows SMB allows an authorized attacker to disclose information over a network. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable. No vendor patch available.
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29955
MEDIUM
CVSS 6.2
Improper input validation in Windows Hyper-V allows an unauthorized attacker to deny service locally. Rated medium severity (CVSS 6.2), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Windows 11 24h2
Windows Server 2022 23h2
Windows Server 2025
-
CVE-2025-29954
MEDIUM
CVSS 5.9
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. Rated medium severity (CVSS 5.9), this vulnerability is remotely exploitable, no authentication required. No vendor patch available.
Microsoft
Denial Of Service
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29839
MEDIUM
CVSS 4.0
Out-of-bounds read in Windows File Server allows an unauthorized attacker to disclose information locally. Rated medium severity (CVSS 4.0), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-29837
MEDIUM
CVSS 5.5
Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29836
MEDIUM
CVSS 6.5
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-29835
MEDIUM
CVSS 6.5
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-29832
MEDIUM
CVSS 6.5
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Microsoft
Buffer Overflow
Windows 10 1507
Windows 10 1607
-
CVE-2025-29830
MEDIUM
CVSS 6.5
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-29829
MEDIUM
CVSS 5.5
Use of uninitialized resource in Windows Trusted Runtime Interface Driver allows an authorized attacker to disclose information locally. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Windows 10 1507
Windows 10 1607
Windows 10 1809
-
CVE-2025-27696
MEDIUM
CVSS 5.3
Incorrect Authorization vulnerability in Apache Superset allows ownership takeover of dashboards, charts or datasets by authenticated users with read permissions.1.1. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Apache
Authentication Bypass
Superset
-
CVE-2025-27488
MEDIUM
CVSS 6.7
Use of hard-coded credentials in Windows Hardware Lab Kit allows an authorized attacker to elevate privileges locally. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Windows Hardware Lab Kit
Windows
-
CVE-2025-26685
MEDIUM
CVSS 6.5
Improper authentication in Microsoft Defender for Identity allows an unauthorized attacker to perform spoofing over an adjacent network. Rated medium severity (CVSS 6.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Authentication Bypass
Defender For Identity
-
CVE-2025-26684
MEDIUM
CVSS 6.7
External control of file name or path in Microsoft Defender for Endpoint allows an authorized attacker to elevate privileges locally. Rated medium severity (CVSS 6.7), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Information Disclosure
Defender For Endpoint
-
CVE-2025-26662
MEDIUM
CVSS 4.4
The Data Services Management Console does not sufficiently encode user-controlled inputs, allowing an attacker to inject malicious script. Rated medium severity (CVSS 4.4), this vulnerability is remotely exploitable. No vendor patch available.
XSS
-
CVE-2025-24495
MEDIUM
CVSS 6.8
Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core™ Ultra Processors may allow an authenticated user to potentially enable information disclosure via local. Rated medium severity (CVSS 6.8). No vendor patch available.
Intel
Information Disclosure
Redhat
Suse
-
CVE-2025-23233
MEDIUM
CVSS 5.1
Incorrect execution-assigned permissions for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via. Rated medium severity (CVSS 5.1), this vulnerability is low attack complexity. No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-22895
MEDIUM
CVSS 6.0
Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information. Rated medium severity (CVSS 6.0), this vulnerability is low attack complexity. No vendor patch available.
Intel
Information Disclosure
-
CVE-2025-22859
MEDIUM
CVSS 5.3
A Relative Path Traversal vulnerability [CWE-23] in FortiClientEMS 7.4.0 through 7.4.1 and FortiClientEMS Cloud 7.4.0 through 7.4.1 may allow a remote unauthenticated attacker to perform a limited. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Path Traversal
Forticlientems
Forticlientems Cloud
Fortinet
-
CVE-2025-22848
MEDIUM
CVSS 5.1
Improper conditions check for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access. Rated medium severity (CVSS 5.1), this vulnerability is low attack complexity. No vendor patch available.
Intel
Denial Of Service
-
CVE-2025-22844
MEDIUM
CVSS 5.3
Improper access control for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an unauthenticated user to potentially enable information disclosure via adjacent access. Rated medium severity (CVSS 5.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Intel
Information Disclosure
Authentication Bypass
-
CVE-2025-22448
MEDIUM
CVSS 6.9
Insecure inherited permissions for some Intel(R) Simics(R) Package Manager software before version 1.12.0 may allow an authenticated user to potentially enable denial of service via local access. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Intel
Denial Of Service
-
CVE-2025-22446
MEDIUM
CVSS 5.1
Inadequate encryption strength for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via adjacent access. Rated medium severity (CVSS 5.1), this vulnerability is low attack complexity. No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-21100
MEDIUM
CVSS 5.6
Improper initialization in the UEFI firmware for the Intel(R) Server D50DNP and M50FCP boards may allow a privileged user to potentially enable information disclosure via local access. Rated medium severity (CVSS 5.6). No vendor patch available.
Intel
Information Disclosure
-
CVE-2025-21099
MEDIUM
CVSS 5.4
Uncontrolled search path for some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20629
MEDIUM
CVSS 5.4
Insecure inherited permissions in the NVM Update Utility for some Intel(R) Ethernet Network Adapter E810 Series before version 4.60 may allow an authenticated user to potentially enable escalation of. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20624
MEDIUM
CVSS 6.9
Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information. Rated medium severity (CVSS 6.9), this vulnerability is low attack complexity. No vendor patch available.
Intel
Information Disclosure
-
CVE-2025-20623
MEDIUM
CVSS 5.7
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel(R) Core™ processors (10th Generation) may allow an. Rated medium severity (CVSS 5.7). No vendor patch available.
Intel
Information Disclosure
Redhat
Suse
-
CVE-2025-20612
MEDIUM
CVSS 5.1
Incorrect execution-assigned permissions for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via. Rated medium severity (CVSS 5.1), this vulnerability is low attack complexity. No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20611
MEDIUM
CVSS 5.7
Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information. Rated medium severity (CVSS 5.7). No vendor patch available.
Intel
Information Disclosure
-
CVE-2025-20108
MEDIUM
CVSS 5.4
Uncontrolled search path element for some Intel(R) Network Adapter Driver installers for Windows 11 before version 29.4 may allow an authenticated user to potentially enable escalation of privilege. Rated medium severity (CVSS 5.4), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Intel
Privilege Escalation
Windows
-
CVE-2025-20104
MEDIUM
CVSS 5.4
Race condition in some Administrative Tools for some Intel(R) Network Adapters package before version 29.4 may allow an authenticated user to potentially enable escalation of privilege via local. Rated medium severity (CVSS 5.4), this vulnerability is low attack complexity. No vendor patch available.
Intel
Race Condition
Privilege Escalation
-
CVE-2025-20103
MEDIUM
CVSS 5.7
Insufficient resource pool in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access. Rated medium severity (CVSS 5.7), this vulnerability is low attack complexity. No vendor patch available.
Intel
Denial Of Service
Redhat
Suse
-
CVE-2025-20101
MEDIUM
CVSS 6.9
Out-of-bounds read for some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable information disclosure or denial of service via local access. Rated medium severity (CVSS 6.9), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Intel
Buffer Overflow
Denial Of Service
-
CVE-2025-20095
MEDIUM
CVSS 5.4
Incorrect Default Permissions for some Intel(R) RealSense™ SDK software before version 2.56.2 may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20084
MEDIUM
CVSS 5.1
Uncontrolled resource consumption for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access. Rated medium severity (CVSS 5.1), this vulnerability is low attack complexity. No vendor patch available.
Intel
Denial Of Service
-
CVE-2025-20079
MEDIUM
CVSS 5.4
Uncontrolled search path for some Intel(R) Advisor software may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
Advisor
Oneapi Base Toolkit
-
CVE-2025-20071
MEDIUM
CVSS 6.8
NULL pointer dereference for some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access. Rated medium severity (CVSS 6.8), this vulnerability is low attack complexity. No vendor patch available.
Intel
Null Pointer Dereference
Denial Of Service
-
CVE-2025-20057
MEDIUM
CVSS 5.1
Uncontrolled resource consumption for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access. Rated medium severity (CVSS 5.1), this vulnerability is low attack complexity. No vendor patch available.
Intel
Denial Of Service
-
CVE-2025-20054
MEDIUM
CVSS 6.8
Uncaught exception in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access. Rated medium severity (CVSS 6.8), this vulnerability is low attack complexity. No vendor patch available.
Intel
Denial Of Service
Redhat
Suse
-
CVE-2025-20052
MEDIUM
CVSS 6.9
Improper access control for some Intel(R) Graphics software may allow an authenticated user to potentially enable denial of service via local access. Rated medium severity (CVSS 6.9), this vulnerability is low attack complexity. No vendor patch available.
Intel
Authentication Bypass
Denial Of Service
-
CVE-2025-20047
MEDIUM
CVSS 5.3
Improper locking in the Intel(R) Integrated Connectivity I/O interface (CNVi) for some Intel(R) Core™ Ultra Processors may allow an unauthenticated user to potentially enable escalation of privilege. Rated medium severity (CVSS 5.3), this vulnerability is no authentication required. No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20043
MEDIUM
CVSS 5.4
Uncontrolled search path for some Intel(R) RealSense™ SDK software before version 2.56.2 may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20041
MEDIUM
CVSS 5.4
Uncontrolled search path for some Intel(R) Graphics software for Intel(R) Arc™ graphics and Intel(R) Iris(R) Xe graphics before version 32.0.101.6325/32.0.101.6252 may allow an authenticated user to. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20039
MEDIUM
CVSS 6.9
Race condition for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Rated medium severity (CVSS 6.9), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Microsoft
Intel
Race Condition
Denial Of Service
Proset Wireless Wifi
-
CVE-2025-20034
MEDIUM
CVSS 5.6
Improper input validation in the BackupBiosUpdate UEFI firmware SmiVariable driver for the Intel(R) Server D50DNP and M50FCP boards before version R01.02.0003 may allow a privileged user to. Rated medium severity (CVSS 5.6). No vendor patch available.
Intel
Information Disclosure
-
CVE-2025-20031
MEDIUM
CVSS 6.8
Improper input validation for some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access. Rated medium severity (CVSS 6.8), this vulnerability is low attack complexity. No vendor patch available.
Intel
Denial Of Service
-
CVE-2025-20022
MEDIUM
CVSS 5.8
Insufficient control flow management for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow a privileged user to potentially enable information disclosure via adjacent access. Rated medium severity (CVSS 5.8). No vendor patch available.
Intel
Information Disclosure
-
CVE-2025-20018
MEDIUM
CVSS 6.9
Untrusted pointer dereference for some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 6.9), this vulnerability is low attack complexity. No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20015
MEDIUM
CVSS 5.4
Uncontrolled search path element for some Intel(R) Ethernet Connection software before version 29.4 may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20013
MEDIUM
CVSS 4.8
Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information. Rated medium severity (CVSS 4.8), this vulnerability is low attack complexity. No vendor patch available.
Intel
Information Disclosure
-
CVE-2025-20012
MEDIUM
CVSS 4.1
Incorrect behavior order for some Intel(R) Core™ Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access. Rated medium severity (CVSS 4.1), this vulnerability is no authentication required. No vendor patch available.
Intel
Information Disclosure
Redhat
Suse
-
CVE-2025-20009
MEDIUM
CVSS 5.6
Improper input validation in the UEFI firmware GenerationSetup module for the Intel(R) Server D50DNP and M50FCP boards may allow a privileged user to potentially enable information disclosure via. Rated medium severity (CVSS 5.6). No vendor patch available.
Intel
Information Disclosure
-
CVE-2025-20008
MEDIUM
CVSS 5.4
Insecure inherited permissions for some Intel(R) Simics(R) Package Manager software before version 1.12.0 may allow a privileged user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4), this vulnerability is low attack complexity. No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-4649
MEDIUM
CVSS 4.9
Improper Handling of Exceptional Conditions vulnerability in Centreon web allows Privilege Escalation. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Privilege Escalation
Centreon Web
-
CVE-2025-4574
MEDIUM
CVSS 6.5
Double-free vulnerability in crossbeam-channel Rust crate's Channel Drop implementation allows memory corruption via a race condition during cleanup, affecting remote network applications that depend on this widely-used concurrency library. The vulnerability requires no authentication or user interaction and can be triggered by unauthenticated remote attackers in networked Rust applications using vulnerable versions. No public exploit code has been identified at the time of analysis, though the issue presents a moderate real-world risk due to the library's prevalence in production Rust ecosystems and the EPSS score of 0.38% indicating low exploitation likelihood.
Rust
Race Condition
Memory Corruption
Redhat
Suse
-
CVE-2025-4427
MEDIUM
CVSS 5.3
An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Actively exploited in the wild (cisa kev) and public exploit code available.
Authentication Bypass
Ivanti
Endpoint Manager Mobile
-
CVE-2025-4339
MEDIUM
CVSS 4.3
The TheGem theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajaxApi() function in all versions up to, and including, 5.10.3. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
Authentication Bypass
PHP
-
CVE-2025-3916
MEDIUM
CVSS 4.6
exploit these issues to potentially execute arbitrary code while the end user opens a malicious project file (SSD file) provided by the attacker. Rated medium severity (CVSS 4.6), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Buffer Overflow
RCE
Stack Overflow
-
CVE-2025-3107
MEDIUM
CVSS 6.5
The Newsletters plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby' parameter in all versions up to, and including, 4.9.9.8 due to insufficient escaping on the user. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
WordPress
SQLi
PHP
-
CVE-2024-56526
MEDIUM
CVSS 4.9
An issue was discovered in OXID eShop before 7. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
Information Disclosure
Eshop
-
CVE-2024-51447
MEDIUM
CVSS 6.9
A vulnerability has been identified in Polarion V2310 (All versions), Polarion V2404 (All versions < V2404.2). Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.
Information Disclosure
Polarion Alm
-
CVE-2024-51446
MEDIUM
CVSS 5.1
A vulnerability has been identified in Polarion V2310 (All versions), Polarion V2404 (All versions < V2404.4). Rated medium severity (CVSS 5.1), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.
XSS
File Upload
Polarion Alm
-
CVE-2024-48869
MEDIUM
CVSS 5.6
Improper restriction of software interfaces to hardware features for some Intel(R) Xeon(R) 6 processor with E-cores when using Intel(R) Trust Domain Extensions (Intel(R) TDX) or Intel(R) Software. Rated medium severity (CVSS 5.6). No vendor patch available.
Intel
Privilege Escalation
Redhat
Suse
-
CVE-2024-47800
MEDIUM
CVSS 5.4
Uncontrolled search path for some Intel(R) Graphics Driver software may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2024-47795
MEDIUM
CVSS 5.4
Uncontrolled search path for some Intel(R) oneAPI DPC++/C++ Compiler software before version 2025.0.0 may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2024-47550
MEDIUM
CVSS 5.4
Incorrect default permissions for some Endurance Gaming Mode software installers may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Privilege Escalation
-
CVE-2024-46895
MEDIUM
CVSS 5.4
Uncontrolled search path for some Intel(R) Arc™ & Iris(R) Xe graphics software before version 32.0.101.6083/32.0.101.5736 may allow an authenticated user to potentially enable escalation of. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2024-45371
MEDIUM
CVSS 5.2
Improper access control for some Intel(R) Arc™ & Iris(R) Xe graphics software before version 32.0.101.6077 may allow an authenticated user to potentially enable denial of service via local access. Rated medium severity (CVSS 5.2), this vulnerability is low attack complexity. No vendor patch available.
Intel
Authentication Bypass
Denial Of Service
-
CVE-2024-45333
MEDIUM
CVSS 6.9
Improper access control for some Intel(R) Data Center GPU Flex Series for Windows driver before version 31.0.101.4314 may allow an authenticated user to potentially enable denial of service via local. Rated medium severity (CVSS 6.9), this vulnerability is low attack complexity. No vendor patch available.
Microsoft
Intel
Authentication Bypass
Denial Of Service
Windows
-
CVE-2024-45332
MEDIUM
CVSS 5.7
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an. Rated medium severity (CVSS 5.7). No vendor patch available.
Intel
Information Disclosure
Redhat
Suse
-
CVE-2024-43420
MEDIUM
CVSS 5.7
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom(R) processors may allow an authenticated user to. Rated medium severity (CVSS 5.7). No vendor patch available.
Intel
Information Disclosure
Redhat
Suse
-
CVE-2024-43101
MEDIUM
CVSS 5.8
Improper access control for some Intel(R) Data Center GPU Flex Series for Windows driver software before version 31.0.101.4255 may allow an authenticated user to potentially enable denial of service. Rated medium severity (CVSS 5.8). No vendor patch available.
Microsoft
Intel
Authentication Bypass
Denial Of Service
Windows
-
CVE-2024-39833
MEDIUM
CVSS 5.4
Uncontrolled search path for some Intel(R) QAT software before version 2.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2024-39758
MEDIUM
CVSS 5.1
Improper access control for some Intel(R) Arc™ & Iris(R) Xe graphics software before version 31.0.101.4032 may allow an authenticated user to potentially enable denial of service via local access. Rated medium severity (CVSS 5.1), this vulnerability is low attack complexity. No vendor patch available.
Intel
Authentication Bypass
Denial Of Service
-
CVE-2024-36340
MEDIUM
CVSS 6.6
A junction point vulnerability within AMD uProf can allow a local low-privileged attacker to create junction points, potentially resulting in arbitrary file deletion or disclosure. Rated medium severity (CVSS 6.6), this vulnerability is low attack complexity.
Amd
Information Disclosure
Uprof
-
CVE-2024-31150
MEDIUM
CVSS 4.8
Out-of-bounds read for some Intel(R) Graphics Driver software may allow an authenticated user to potentially enable information disclosure via local access. Rated medium severity (CVSS 4.8), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Intel
Buffer Overflow
-
CVE-2024-31073
MEDIUM
CVSS 5.4
Uncontrolled search path for some Intel(R) oneAPI Level Zero software may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2024-29222
MEDIUM
CVSS 5.8
Out-of-bounds write for some Intel(R) Graphics Driver software may allow an authenticated user to potentially enable denial of service via local access. Rated medium severity (CVSS 5.8), this vulnerability is low attack complexity. No vendor patch available.
Memory Corruption
Buffer Overflow
Intel
Denial Of Service
-
CVE-2024-28956
MEDIUM
CVSS 5.7
Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information. Rated medium severity (CVSS 5.7). No vendor patch available.
Intel
Information Disclosure
Redhat
Suse
-
CVE-2024-28954
MEDIUM
CVSS 5.4
Incorrect default permissions for some Intel(R) Graphics Driver installers may allow an authenticated user to potentially enable escalation of privilege via local access. Rated medium severity (CVSS 5.4). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2024-28036
MEDIUM
CVSS 5.7
Improper conditions check for some Intel(R) Arc™ GPU may allow an authenticated user to potentially enable denial of service via local access. Rated medium severity (CVSS 5.7). No vendor patch available.
Intel
Denial Of Service
-
CVE-2024-6364
MEDIUM
CVSS 6.9
A vulnerability in Absolute Persistence® versions before 2.8 exists when it is not activated. Rated medium severity (CVSS 6.9). No vendor patch available.
Authentication Bypass
Persistence
-
CVE-2025-47864
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47863
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47862
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47861
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47860
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47859
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47858
None
Rejected reason: Not used. No vendor patch available.
Information Disclosure
-
CVE-2025-47280
LOW
CVSS 2.3
Umbraco Forms is a form builder that integrates with the Umbraco content management system. Rated low severity (CVSS 2.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.
Authentication Bypass
Umbraco Forms
-
CVE-2025-47278
LOW
CVSS 1.8
Flask is a web server gateway interface (WSGI) web application framework. Rated low severity (CVSS 1.8), this vulnerability is low attack complexity. No vendor patch available.
Python
Information Disclosure
-
CVE-2025-40571
LOW
CVSS 2.1
A vulnerability has been identified in Mendix OIDC SSO (Mendix 10 compatible) (All versions < V4.1.0), Mendix OIDC SSO (Mendix 10.12 compatible) (All versions < V4.0.1), Mendix OIDC SSO (Mendix 9. Rated low severity (CVSS 2.1), this vulnerability is remotely exploitable. No vendor patch available.
Information Disclosure
-
CVE-2025-30207
LOW
CVSS 2.3
Kirby is an open-source content management system. Rated low severity (CVSS 2.3), this vulnerability is no authentication required, low attack complexity. No vendor patch available.
Nginx
Apache
PHP
Path Traversal
Kirby
-
CVE-2025-22246
LOW
CVSS 3.0
Cloud Foundry UAA release versions from v77.21.0 to v7.31.0 are vulnerable to a private key exposure in logs. Rated low severity (CVSS 3.0). No vendor patch available.
Information Disclosure
Cf Deployment
Uaa Release
-
CVE-2025-21081
LOW
CVSS 2.0
Protection mechanism failure for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via local access. Rated low severity (CVSS 2.0). No vendor patch available.
Intel
Privilege Escalation
-
CVE-2025-20616
LOW
CVSS 2.1
Uncontrolled resource consumption for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via adjacent. Rated low severity (CVSS 2.1), this vulnerability is low attack complexity. No vendor patch available.
Intel
Privilege Escalation
Denial Of Service
-
CVE-2025-20076
LOW
CVSS 2.1
Improper access control for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. Rated low severity (CVSS 2.1), this vulnerability is no authentication required. No vendor patch available.
Intel
Authentication Bypass
Privilege Escalation
-
CVE-2025-20030
LOW
CVSS 2.1
Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information. Rated low severity (CVSS 2.1). No vendor patch available.
Intel
Information Disclosure
-
CVE-2025-4668
None
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. No vendor patch available.
Information Disclosure
-
CVE-2024-35281
LOW
CVSS 2.5
An improper isolation or compartmentalization vulnerability [CWE-653] in FortiClientMac version 7.4.2 and below, version 7.2.8 and below, 7.0 all versions and FortiVoiceUCDesktop 3.0 all versions. Rated low severity (CVSS 2.5). No vendor patch available.
Code Injection
Forticlient
Fortifone Softclient
-
CVE-2024-12533
LOW
CVSS 3.3
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from. Rated low severity (CVSS 3.3), this vulnerability is low attack complexity. No vendor patch available.
Information Disclosure
Securecore Technology