Microsoft

2104 CVEs vendor

Monthly

CVE-2025-48812 MEDIUM This Month

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

Microsoft Information Disclosure Buffer Overflow Excel 365 Apps +3
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-48811 MEDIUM This Month

A privilege escalation vulnerability (CVSS 6.7) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows Server 2022 23h2 Windows Server 2016 Windows 10 1507 +11
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2025-48810 MEDIUM This Month

CVE-2025-48810 is a security vulnerability (CVSS 5.5) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows 11 24h2 Windows Server 2025 Windows
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-48809 MEDIUM This Month

CVE-2025-48809 is a security vulnerability (CVSS 5.5) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows 11 24h2 Windows Server 2025 Windows
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-48808 MEDIUM This Month

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.

Microsoft Information Disclosure Windows Server 2019 Windows Server 2022 23h2 Windows Server 2025 +13
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-48806 HIGH This Week

Use after free in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally.

Microsoft Use After Free Memory Corruption Denial Of Service Windows Server 2008 +14
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-48805 HIGH This Week

Heap-based buffer overflow in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally.

Microsoft Heap Overflow Buffer Overflow Windows Server 2025 Windows 10 21h2 +13
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-48804 MEDIUM This Month

A security vulnerability in Acceptance of extraneous untrusted data with trusted data in Windows BitLocker (CVSS 6.8) that allows an unauthorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Authentication Bypass Windows 10 1507 Windows 11 23h2 Windows 10 1607 +12
NVD
CVSS 3.1
6.8
EPSS
0.0%
CVE-2025-48803 MEDIUM This Month

A privilege escalation vulnerability (CVSS 6.7) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows 11 22h2 Windows 11 23h2 Windows 10 21h2 +11
NVD
CVSS 3.1
6.7
EPSS
0.0%
CVE-2025-48802 MEDIUM This Month

Improper certificate validation in Windows SMB allows an authorized attacker to perform spoofing over a network.

Microsoft Information Disclosure Windows Server 2022 23h2 Windows Server 2022 Windows 11 22h2 +2
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-48800 MEDIUM This Month

Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

Microsoft Authentication Bypass Windows 10 1607 Windows Server 2022 Windows 11 23h2 +11
NVD
CVSS 3.1
6.8
EPSS
0.1%
CVE-2025-48799 HIGH POC This Week

Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.

Microsoft Information Disclosure Windows 10 1607 Windows 11 24h2 Windows 11 22h2 +6
NVD
CVSS 3.1
7.8
EPSS
0.3%
CVE-2025-48003 MEDIUM This Month

Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

Microsoft Authentication Bypass Windows 10 22h2 Windows Server 2022 Windows 11 22h2 +8
NVD
CVSS 3.1
6.8
EPSS
0.1%
CVE-2025-48002 MEDIUM This Month

Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to disclose information over an adjacent network.

Microsoft Information Disclosure Buffer Overflow Windows 11 24h2 Windows Server 2025 +1
NVD
CVSS 3.1
5.7
EPSS
0.1%
CVE-2025-48001 MEDIUM This Month

Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

Microsoft Authentication Bypass Windows 10 1507 Windows 11 24h2 Windows 10 21h2 +12
NVD
CVSS 3.1
6.8
EPSS
0.1%
CVE-2025-48000 HIGH This Week

Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.

Microsoft Race Condition Denial Of Service Windows Server 2022 23h2 Windows 11 23h2 +11
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47999 MEDIUM This Month

A security vulnerability in Missing synchronization in Windows Hyper-V (CVSS 6.8) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows 10 1607 Windows Server 2022 23h2 Windows Server 2019 +10
NVD
CVSS 3.1
6.8
EPSS
0.2%
CVE-2025-47998 HIGH This Week

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

Microsoft Heap Overflow Buffer Overflow Windows Server 2019 Windows Server 2016 +6
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-47996 HIGH This Week

Integer underflow (wrap or wraparound) in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally.

Microsoft Information Disclosure Buffer Overflow Windows Server 2016 Windows 10 1507 +14
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47994 HIGH This Week

Deserialization of untrusted data in Microsoft Office allows an unauthorized attacker to elevate privileges locally.

Deserialization Microsoft Office Long Term Servicing Channel Sharepoint Enterprise Server Office +1
NVD
CVSS 3.1
7.8
EPSS
0.3%
CVE-2025-47993 HIGH This Week

Improper access control in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.

Microsoft Authentication Bypass Windows Server 2022 23h2 Windows 11 24h2 Windows Server 2025
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47991 HIGH This Week

Use after free in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally.

Microsoft Use After Free Memory Corruption Denial Of Service Windows Server 2022 +11
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47988 HIGH This Week

Improper control of generation of code ('code injection') in Azure Monitor Agent allows an unauthorized attacker to execute code over an adjacent network.

Microsoft RCE Code Injection Azure Monitor Agent
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-47987 HIGH This Week

Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authorized attacker to elevate privileges locally.

Microsoft Heap Overflow Buffer Overflow Windows Server 2012 Windows Server 2019 +14
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47986 HIGH This Week

Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.

Use After Free Memory Corruption Denial Of Service Windows Server 2022 Windows 10 1809 +14
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-47985 HIGH This Week

A privilege escalation vulnerability in Untrusted pointer dereference in Windows Event Tracing (CVSS 7.8) that allows an authorized attacker. High severity vulnerability requiring prompt remediation.

Microsoft Information Disclosure Windows 10 1607 Windows 11 23h2 Windows 10 1507 +13
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47984 HIGH This Week

Protection mechanism failure in Windows GDI allows an unauthorized attacker to disclose information over a network.

Microsoft Information Disclosure Windows Server 2008 Windows 11 22h2 Windows 10 22h2 +13
NVD
CVSS 3.1
7.5
EPSS
0.3%
CVE-2025-47982 HIGH This Week

Improper input validation in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally.

Microsoft Information Disclosure Windows 10 1607 Windows Server 2025 Windows 11 23h2 +10
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47981 CRITICAL POC Act Now

Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network.

Microsoft Heap Overflow Buffer Overflow Windows 10 21h2 Windows 11 23h2 +14
NVD
CVSS 3.1
9.8
EPSS
0.6%
CVE-2025-47980 MEDIUM This Month

Exposure of sensitive information to an unauthorized actor in Windows Imaging Component allows an unauthorized attacker to disclose information locally.

Microsoft Information Disclosure Windows Server 2022 Windows 11 24h2 Windows 10 1809 +13
NVD
CVSS 3.1
6.2
EPSS
0.1%
CVE-2025-47978 MEDIUM This Month

Out-of-bounds read in Windows Kerberos allows an authorized attacker to deny service over a network.

Microsoft Information Disclosure Buffer Overflow Windows Server 2022 23h2 Windows Server 2022 +2
NVD
CVSS 3.1
6.5
EPSS
0.2%
CVE-2025-47976 HIGH This Week

Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.

Microsoft Use After Free Memory Corruption Denial Of Service Windows Server 2022 23h2 +15
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47975 HIGH This Week

A privilege escalation vulnerability in Double free in Windows SSDP Service (CVSS 7.0) that allows an authorized attacker. High severity vulnerability requiring prompt remediation.

Microsoft Information Disclosure Windows 10 1809 Windows 11 22h2 Windows 11 24h2 +13
NVD
CVSS 3.1
7.0
EPSS
0.1%
CVE-2025-47973 HIGH This Week

Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.

Buffer Overflow Windows Server 2008 Windows Server 2016 Windows 10 21h2 Windows Server 2012 +12
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47972 HIGH This Week

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges over a network.

Microsoft Race Condition Information Disclosure Windows Server 2016 Windows Server 2022 +11
NVD
CVSS 3.1
8.0
EPSS
0.1%
CVE-2025-47971 HIGH This Week

Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.

Buffer Overflow Windows 10 22h2 Windows 10 1607 Windows 10 1507 Windows 10 1809 +12
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-47178 HIGH This Week

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to execute code over an adjacent network.

Microsoft SQLi Configuration Manager 2503
NVD
CVSS 3.1
8.0
EPSS
0.2%
CVE-2025-47159 HIGH This Week

Protection mechanism failure in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.

Microsoft Information Disclosure Windows 11 22h2 Windows 10 1507 Windows 10 22h2 +11
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-33054 HIGH This Week

A security vulnerability in Insufficient UI warning of dangerous operations in Remote Desktop Client (CVSS 8.1) that allows an unauthorized attacker. High severity vulnerability requiring prompt remediation.

Authentication Bypass Windows 11 24h2 Windows Server 2025 Windows 11 22h2 Windows 11 23h2 +1
NVD
CVSS 3.1
8.1
EPSS
0.1%
CVE-2025-26636 MEDIUM This Month

CVE-2025-26636 is a security vulnerability (CVSS 5.5) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows Server 2025 Windows 11 24h2 Windows
NVD
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-7326 HIGH This Week

A privilege escalation vulnerability in Weak authentication in EOL ASP.NET Core (CVSS 7.0) that allows an unauthorized attacker. High severity vulnerability requiring prompt remediation.

Microsoft Authentication Bypass
NVD HeroDevs
CVSS 3.1
7.0
EPSS
0.3%
CVE-2025-42979 MEDIUM This Month

CVE-2025-42979 is a security vulnerability (CVSS 5.6). Remediation should follow standard vulnerability management procedures.

Microsoft Sap Information Disclosure Windows
NVD
CVSS 3.1
5.6
EPSS
0.0%
CVE-2023-50786 MEDIUM This Month

A remote code execution vulnerability in Dradis through 4.16.0 (CVSS 4.1). Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Dradis Windows
NVD
CVSS 3.1
4.1
EPSS
0.0%
CVE-2025-45938 MEDIUM This Month

Akeles Out of Office Assistant for Jira 4.0.1 is vulberable to Cross Site Scripting (XSS) via the Jira fullName parameter.

Microsoft XSS Atlassian Out Of Office Assistant
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-43713 MEDIUM This Month

ASNA Assist and ASNA Registrar before 2025-03-31 allow deserialization attacks against .NET remoting. These are Windows system services that support license key management and deprecated Windows network authentication. The services are implemented with .NET remoting and can be exploited via well-known deserialization techniques inherent in the technology. Because the services run with SYSTEM-level rights, exploits can be crafted to achieve escalation of privilege and arbitrary code execution. This affects DataGate for SQL Server 17.0.36.0 and 16.0.89.0, DataGate Component Suite 17.0.36.0 and 16.0.89.0, DataGate Monitor 17.0.26.0 and 16.0.65.0, DataGate WebPak 17.0.37.0 and 16.0.90.0, Monarch for .NET 11.4.50.0 and 10.0.62.0, Encore RPG 4.1.36.0, Visual RPG .NET FW 17.0.37.0 and 16.0.90.0, Visual RPG .NET FW Windows Deployment 17.0.36.0 and 16.0.89.0, WingsRPG 11.0.38.0 and 10.0.95.0, Mobile RPG 11.0.35.0 and 10.0.94.0, Monarch Framework for .NET FW 11.0.36.0 and 10.0.89.0, Browser Terminal 17.0.37.0 and 16.0.90.0, Visual RPG Classic 5.2.7.0 and 5.1.17.0, Visual RPG Deployment 5.2.7.0 and 5.1.17.0, and DataGate Studio 17.0.38.0 and 16.0.104.0.

Deserialization RCE Microsoft Privilege Escalation Windows
NVD
CVSS 3.1
6.5
EPSS
0.3%
CVE-2025-27461 HIGH This Week

During startup, the device automatically logs in the EPC2 Windows user without requesting a password.

Microsoft Authentication Bypass Meac300 Fnade4 Firmware Windows
NVD
CVSS 3.1
7.6
EPSS
0.1%
CVE-2025-27460 HIGH This Week

The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker. This allows an attacker with physical access to the device to use an alternative operating system to interact with the hard drives, completely circumventing the Windows login. The attacker can read from and write to all files on the hard drives.

Microsoft Information Disclosure Meac300 Fnade4 Firmware Windows
NVD
CVSS 3.1
7.6
EPSS
0.0%
CVE-2025-49713 HIGH POC This Week

Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.

Microsoft Google Memory Corruption Authentication Bypass Edge Chromium +1
NVD GitHub
CVSS 3.1
8.8
EPSS
0.4%
CVE-2025-36630 HIGH This Week

In Tenable Nessus versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege.

Microsoft Privilege Escalation Nessus Windows
NVD
CVSS 3.1
8.4
EPSS
0.0%
CVE-2025-49741 HIGH POC This Week

A security vulnerability in No cwe for this (CVSS 7.4) that allows an unauthorized attacker. Risk factors: public PoC available.

Microsoft Google Information Disclosure Edge Chromium Chrome
NVD Exploit-DB
CVSS 3.1
7.4
EPSS
0.9%
CVE-2025-53099 HIGH PATCH This Week

Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action.

Microsoft Information Disclosure Sentry
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2024-46992 HIGH PATCH This Week

A remote code execution vulnerability in Electron (CVSS 7.8). High severity vulnerability requiring prompt remediation.

Microsoft Apple Authentication Bypass Debian Windows +1
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-53013 MEDIUM PATCH This Month

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. A vulnerability present in versions 0.9.10 through 0.9.16 allows a user to authenticate to a Linux host via Himmelblau using an *invalid* Linux Hello PIN, provided the host is offline. While the user gains access to the local system, Single Sign-On (SSO) fails due to the network being down and the inability to issue tokens (due to a failure to unlock the Hello key). The core issue lies in an incorrect assumption within the `acquire_token_by_hello_for_business_key` function: it was expected to return a `TPMFail` error for an invalid Hello key when offline, but instead, a preceding nonce request resulted in a `RequestFailed` error, leading the system to erroneously transition to an offline success state without validating the Hello key unlock. This impacts systems using Himmelblau for authentication when operating in an offline state with Hello PIN authentication enabled. Rocky Linux 8 (and variants) are not affected by this vulnerability. The problem is resolved in Himmelblau version 0.9.17. A workaround is available for users who cannot immediately upgrade. Disabling Hello PIN authentication by setting `enable_hello = false` in `/etc/himmelblau/himmelblau.conf` will mitigate the vulnerability.

Microsoft Authentication Bypass Suse
NVD GitHub
CVSS 3.1
5.2
EPSS
0.0%
CVE-2024-52928 CRITICAL Act Now

Arc before 1.26.1 on Windows has a bypass issue in the site settings that allows websites (with previously granted permissions) to add new permissions when the user clicks anywhere on the website.

Microsoft Authentication Bypass Arc Windows
NVD
CVSS 3.1
9.6
EPSS
0.1%
CVE-2025-34046 CRITICAL Act Now

An unauthenticated file upload vulnerability exists in the Fanwei E-Office <= v9.4 web management interface. The vulnerability affects the /general/index/UploadFile.php endpoint, which improperly validates uploaded files when invoked with certain parameters (uploadType=eoffice_logo or uploadType=theme). An attacker can exploit this flaw by sending a crafted HTTP POST request to upload arbitrary files without requiring authentication. Successful exploitation could enable remote code execution on the affected server, leading to complete compromise of the web application and potentially the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

File Upload PHP RCE Microsoft
NVD GitHub
CVSS 4.0
10.0
EPSS
2.6%
CVE-2025-5966 HIGH This Week

Zohocorp ManageEngine Exchange reporter Plus version 5722 and below are vulnerable to Stored XSS in the Attachments by filename keyword report.

Microsoft XSS Manageengine Exchange Reporter Plus
NVD
CVSS 3.1
8.1
EPSS
1.9%
CVE-2025-5366 HIGH This Week

Zohocorp ManageEngine Exchange reporter Plus version 5722 and below are vulnerable to Stored XSS in the Folder-wise read mails with subject report.

Microsoft XSS Manageengine Exchange Reporter Plus
NVD
CVSS 3.1
8.1
EPSS
1.9%
CVE-2025-49797 HIGH This Week

CVE-2025-49797 is a privilege escalation vulnerability in multiple Brother device driver installers for Windows that allows a local attacker with limited user privileges to execute arbitrary code with administrative rights without user interaction. The vulnerability affects various Brother printer and multifunction device driver packages across multiple versions. While the CVSS score of 7.8 indicates significant severity, real-world exploitability depends on whether an attacker has local access to a system during driver installation or can manipulate installer processes.

Microsoft Privilege Escalation Windows
NVD
CVSS 3.0
7.8
EPSS
0.0%
CVE-2025-41255 HIGH This Week

CVE-2025-41255 is a security vulnerability (CVSS 8.0). High severity vulnerability requiring prompt remediation.

Microsoft Information Disclosure Windows
NVD GitHub
CVSS 3.1
8.0
EPSS
0.0%
CVE-2025-6557 MEDIUM PATCH This Month

Insufficient data validation in DevTools in Google Chrome on Windows prior to 138.0.7204.49 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)

Microsoft Google XSS RCE Ubuntu +4
NVD
CVSS 3.1
5.4
EPSS
0.1%
CVE-2025-36537 HIGH This Week

CVE-2025-36537 is a local privilege escalation vulnerability in TeamViewer Client (Full and Host) and Tensor prior to version 15.67 on Windows that allows an unprivileged local user to delete arbitrary files with SYSTEM privileges by exploiting improper permission assignment in the MSI rollback mechanism. The vulnerability is limited to Remote Management features (Backup, Monitoring, and Patch Management), has a CVSS score of 7.0, and requires local access with medium attack complexity but no user interaction. This vulnerability represents a significant elevation-of-privilege risk for organizations relying on TeamViewer for remote management.

Microsoft Information Disclosure Windows
NVD
CVSS 3.1
7.0
EPSS
0.0%
CVE-2025-2828 CRITICAL POC PATCH Act Now

A remote code execution vulnerability in langchain-ai/langchain (CVSS 10.0). Risk factors: public PoC available. Vendor patch is available.

Microsoft SSRF Langchain Redhat AI / ML
NVD GitHub
CVSS 3.1
10.0
EPSS
0.1%
CVE-2025-6513 CRITICAL Act Now

CVE-2025-6513 is a local privilege escalation vulnerability in the BRAIN2 application where standard Windows users can access and decrypt the application's database configuration file without authentication. This allows unprivileged local users to obtain database credentials and potentially compromise sensitive data, with a CVSS score of 9.3 indicating critical severity. The vulnerability affects system confidentiality, integrity, and availability across trust boundaries.

Microsoft Information Disclosure Windows Privilege Escalation
NVD
CVSS 3.1
9.3
EPSS
0.0%
CVE-2025-52488 HIGH POC PATCH THREAT Act Now

DNN (DotNetNuke) CMS versions 6.0.0 through 10.0.0 contain a vulnerability that can expose NTLM hashes to a third-party SMB server. Through a specially crafted series of interactions, an attacker can force the DNN server to authenticate to an attacker-controlled SMB server, capturing NTLM credential hashes for offline cracking.

Microsoft Information Disclosure Dotnetnuke
NVD GitHub
CVSS 3.1
8.6
EPSS
14.8%
CVE-2025-52487 HIGH PATCH This Week

CVE-2025-52487 is an authentication bypass vulnerability in DNN (DotNetNuke) versions 7.0.0 through 10.0.0 that allows attackers to circumvent IP-based login filters by crafting specially designed requests or using proxy techniques. An unauthenticated remote attacker can bypass IP whitelist restrictions to attempt logins from unauthorized locations, potentially gaining unauthorized access to administrative accounts. The vulnerability has been patched in version 10.0.1 and carries a CVSS 7.5 score reflecting high integrity impact, though no public exploitation or active KEV listing has been reported at this time.

Microsoft Authentication Bypass Dotnetnuke
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-52486 MEDIUM PATCH This Month

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows specially crafted content in URLs to be used with TokenReplace and not be properly sanitized by some SkinObjects. This issue has been patched in version 10.0.1.

Microsoft XSS Dotnetnuke
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-52485 MEDIUM PATCH This Month

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows a specially crafted request to inject scripts in the Activity Feed Attachments endpoint which will then render in the feed. This issue has been patched in version 10.0.1.

Microsoft XSS Dotnetnuke
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-49715 HIGH This Week

CVE-2025-49715 is a private personal information disclosure vulnerability in Microsoft Dynamics 365 FastTrack Implementation Assets that allows unauthenticated network-based attackers to access sensitive user data without any user interaction. The vulnerability has a CVSS score of 7.5 (High) with confirmed high confidentiality impact, and affects organizations using Dynamics 365 FastTrack resources. Given the network-accessible nature and lack of authentication requirements, this poses significant risk to enterprise customer data security.

Information Disclosure Microsoft Dynamics 365
NVD
CVSS 3.1
7.5
EPSS
0.3%
CVE-2024-45208 CRITICAL Act Now

Critical remote code execution vulnerability in Versa Director SD-WAN orchestration platform affecting the Cisco NCS application service bound to TCP ports 4566 and 4570. An unauthenticated network attacker can exploit weak HA authentication mechanisms to gain unauthorized administrative access and execute arbitrary code with CVSS 9.8 severity. While no active exploitation has been confirmed, third-party proof-of-concept code has been publicly disclosed, significantly elevating real-world risk.

Microsoft RCE Cisco
NVD
CVSS 3.1
9.8
EPSS
1.2%
CVE-2025-6240 MEDIUM This Month

Improper Input Validation vulnerability in Profisee on Windows (filesystem modules) allows Path Traversal after authentication to the Profisee system.This issue affects Profisee: from 2020R1 before 2024R2.

Microsoft Path Traversal Windows
NVD
CVSS 4.0
5.0
EPSS
0.1%
CVE-2022-49986 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq storvsc_error_wq workqueue should not be marked as WQ_MEM_RECLAIM as it doesn't need to make forward progress under memory pressure. Marking this workqueue as WQ_MEM_RECLAIM may cause deadlock while flushing a non-WQ_MEM_RECLAIM workqueue. In the current state it causes the following warning: [ 14.506347] ------------[ cut here ]------------ [ 14.506354] workqueue: WQ_MEM_RECLAIM storvsc_error_wq_0:storvsc_remove_lun is flushing !WQ_MEM_RECLAIM events_freezable_power_:disk_events_workfn [ 14.506360] WARNING: CPU: 0 PID: 8 at <-snip->kernel/workqueue.c:2623 check_flush_dependency+0xb5/0x130 [ 14.506390] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.4.0-1086-azure #91~18.04.1-Ubuntu [ 14.506391] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022 [ 14.506393] Workqueue: storvsc_error_wq_0 storvsc_remove_lun [ 14.506395] RIP: 0010:check_flush_dependency+0xb5/0x130 <-snip-> [ 14.506408] Call Trace: [ 14.506412] __flush_work+0xf1/0x1c0 [ 14.506414] __cancel_work_timer+0x12f/0x1b0 [ 14.506417] ? kernfs_put+0xf0/0x190 [ 14.506418] cancel_delayed_work_sync+0x13/0x20 [ 14.506420] disk_block_events+0x78/0x80 [ 14.506421] del_gendisk+0x3d/0x2f0 [ 14.506423] sr_remove+0x28/0x70 [ 14.506427] device_release_driver_internal+0xef/0x1c0 [ 14.506428] device_release_driver+0x12/0x20 [ 14.506429] bus_remove_device+0xe1/0x150 [ 14.506431] device_del+0x167/0x380 [ 14.506432] __scsi_remove_device+0x11d/0x150 [ 14.506433] scsi_remove_device+0x26/0x40 [ 14.506434] storvsc_remove_lun+0x40/0x60 [ 14.506436] process_one_work+0x209/0x400 [ 14.506437] worker_thread+0x34/0x400 [ 14.506439] kthread+0x121/0x140 [ 14.506440] ? process_one_work+0x400/0x400 [ 14.506441] ? kthread_park+0x90/0x90 [ 14.506443] ret_from_fork+0x35/0x40 [ 14.506445] ---[ end trace 2d9633159fdc6ee7 ]---

Microsoft Information Disclosure Ubuntu Linux Debian +3
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2022-49976 MEDIUM PATCH This Month

CVE-2022-49976 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Microsoft Linux Information Disclosure Google Ubuntu +6
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2022-49963 MEDIUM PATCH This Month

CVE-2022-49963 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Microsoft Buffer Overflow Linux Ubuntu Debian +4
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-48993 MEDIUM PATCH This Month

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.123 and 25.0.27, a malicious JavaScript payload can be executed via the Look and Feel formatting fields. Any user can update their Look and Feel Formatting input fields, but the web application does not sanitize their input. This could result in a reflected cross-site scripting (XSS) attack. This issue has been patched in versions 6.8.123 and 25.0.27.

Microsoft XSS Group Office
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-48992 MEDIUM POC PATCH This Month

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.123 and 25.0.27, a stored and blind cross-site scripting (XSS) vulnerability exists in the Name Field of the user profile. A malicious attacker can change their name to a javascript payload, which is executed when a user adds the malicious user to their Synchronization > Address books. This issue has been patched in versions 6.8.123 and 25.0.27.

Microsoft XSS Group Office
NVD GitHub
CVSS 3.1
4.8
EPSS
0.1%
CVE-2025-49124 HIGH PATCH This Week

A security vulnerability in Apache Tomcat installer for Windows (CVSS 8.4). High severity vulnerability requiring prompt remediation.

Microsoft Apache Tomcat Windows Privilege Escalation +1
NVD HeroDevs GitHub
CVSS 3.1
8.4
EPSS
0.1%
CVE-2025-36632 HIGH This Week

Privilege escalation vulnerability in Tenable Agent for Windows (versions prior to 10.8.5) that allows a non-administrative local user to execute arbitrary code with SYSTEM-level privileges. This is a local privilege escalation (LPE) vulnerability with high severity (CVSS 7.8) requiring only local access and low complexity exploitation. The vulnerability represents a critical risk in multi-user Windows environments where standard users could gain complete system control.

Microsoft Information Disclosure Nessus Agent Windows
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-36633 HIGH This Week

Local privilege escalation vulnerability in Tenable Agent for Windows (versions prior to 10.8.5) that allows non-administrative users to arbitrarily delete system files with SYSTEM privileges. This vulnerability has a CVSS score of 8.8 (High) and could enable local attackers to compromise system integrity and gain elevated privileges. The attack requires local access but no user interaction, making it a significant risk for multi-user Windows systems running vulnerable Tenable Agent versions.

Microsoft Privilege Escalation Nessus Agent Windows
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-36631 HIGH This Week

Privilege escalation vulnerability in Tenable Agent for Windows (versions prior to 10.8.5) that allows non-administrative users to overwrite arbitrary system files with log content while executing at SYSTEM privilege level. This vulnerability enables local attackers without admin rights to achieve arbitrary file write operations with elevated privileges, potentially leading to system compromise. The vulnerability has a CVSS score of 8.4 (High) and affects Windows deployments; patch availability exists in version 10.8.5 and later.

Microsoft Information Disclosure Nessus Agent Windows
NVD
CVSS 3.1
8.4
EPSS
0.0%
CVE-2025-5491 HIGH This Week

Remote code execution vulnerability in Acer ControlCenter that exploits a misconfigured Windows Named Pipe to allow authenticated attackers with low privileges to execute arbitrary code with SYSTEM-level permissions. The vulnerability has a CVSS score of 8.8 (High) and requires only network access and low privileges, making it a significant elevation-of-privilege vector; real-world exploitation likelihood depends on confirmation of active KEV listing and public exploit availability.

Microsoft RCE Windows
NVD
CVSS 3.1
8.8
EPSS
0.6%
CVE-2025-47959 HIGH This Week

Command injection vulnerability in Visual Studio that allows an authenticated attacker with local user interaction to execute arbitrary code over a network with high impact on confidentiality, integrity, and availability. While the vulnerability requires prior authorization and user interaction, successful exploitation could lead to complete system compromise. No public indication of active exploitation or widespread POC availability is currently documented, but the CVSS 7.1 score reflects significant risk in collaborative development environments where multiple authorized users access shared Visual Studio instances.

Command Injection Microsoft Windows RCE Visual Studio 2022
NVD
CVSS 3.1
7.1
EPSS
0.2%
CVE-2025-30399 HIGH PATCH This Week

CVE-2025-30399 is an untrusted search path vulnerability in .NET and Visual Studio that allows unauthenticated remote attackers to execute arbitrary code through a network vector, requiring user interaction. The vulnerability affects multiple versions of .NET Framework and Visual Studio across Windows platforms. While the CVSS score is 7.5 (high), the attack complexity is high and requires user interaction, potentially limiting real-world exploitation frequency.

Microsoft Dotnet RCE Powershell Visual Studio 2022 +3
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-0913 MEDIUM PATCH This Month

os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink.

Microsoft Information Disclosure Ubuntu Debian Go +2
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-26383 MEDIUM This Month

A security vulnerability in The (CVSS 6.3). Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows
NVD
CVSS 4.0
6.3
EPSS
0.0%
CVE-2025-49148 HIGH This Week

DLL hijacking vulnerability in ClipShare Server for Windows (versions prior to 3.8.5) that allows local, non-privileged users to achieve arbitrary code execution and potential privilege escalation by placing malicious DLLs in the application directory. The vulnerability exploits Windows' default DLL search order, where the application directory is searched before system paths, and poses a reliable privilege escalation risk when ClipShare is run by elevated users. This is a local attack requiring write access to the installation directory.

Microsoft RCE Privilege Escalation Windows
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-32711 CRITICAL POC Act Now

CVE-2025-32711 is an AI command injection vulnerability in Microsoft 365 Copilot that enables unauthenticated network-based attacks to disclose sensitive information without user interaction. The vulnerability affects M365 Copilot deployments and allows attackers to inject malicious commands that bypass normal authorization controls. With a critical CVSS score of 9.3 and no authentication requirement, this poses an immediate risk to organizations using Copilot features; exploitation status and POC availability require confirmation through Microsoft security advisories.

Command Injection Microsoft Information Disclosure 365 Copilot
NVD GitHub
CVSS 3.1
9.3
EPSS
3.4%
CVE-2025-5986 MEDIUM PATCH This Month

A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.

Microsoft Mozilla Information Disclosure Ubuntu Debian +4
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2024-1244 CRITICAL Act Now

A remote code execution vulnerability in the OSSEC HIDS agent for Windows (CVSS 9.5) that allows an attacker. Critical severity with potential for significant impact on affected systems.

Microsoft RCE Windows
NVD
CVSS 4.0
9.5
EPSS
0.5%
CVE-2024-1243 HIGH POC This Week

CVE-2024-1243 is an improper input validation vulnerability in Wazuh agent for Windows (versions prior to 4.8.0) that allows attackers with control over the Wazuh server or possession of agent keys to redirect agents to malicious UNC paths, resulting in NetNTLMv2 hash leakage. The leaked hash can be relayed for remote code execution or abused for privilege escalation to SYSTEM level via AD CS certificate forging. This vulnerability represents a critical supply-chain/credential-leakage risk for Windows environments using Wazuh, though exploitation requires elevated privileges (high PR requirement) and knowledge of agent keys or server compromise.

Microsoft RCE Wazuh Windows
NVD GitHub
CVSS 3.1
7.2
EPSS
0.5%
CVE-2025-32717 HIGH This Week

A buffer overflow vulnerability in Heap-based buffer overflow in Microsoft Office Word (CVSS 8.4) that allows an unauthorized attacker. High severity vulnerability requiring prompt remediation.

Microsoft Buffer Overflow Windows RCE 365 Apps
NVD
CVSS 3.1
8.4
EPSS
0.3%
CVE-2025-48812
EPSS 0% CVSS 5.5
MEDIUM This Month

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

Microsoft Information Disclosure Buffer Overflow +5
NVD
CVE-2025-48811
EPSS 0% CVSS 6.7
MEDIUM This Month

A privilege escalation vulnerability (CVSS 6.7) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows Server 2022 23h2 +13
NVD
CVE-2025-48810
EPSS 0% CVSS 5.5
MEDIUM This Month

CVE-2025-48810 is a security vulnerability (CVSS 5.5) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows 11 24h2 +2
NVD
CVE-2025-48809
EPSS 0% CVSS 5.5
MEDIUM This Month

CVE-2025-48809 is a security vulnerability (CVSS 5.5) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows 11 24h2 +2
NVD
CVE-2025-48808
EPSS 0% CVSS 5.5
MEDIUM This Month

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.

Microsoft Information Disclosure Windows Server 2019 +15
NVD
CVE-2025-48806
EPSS 0% CVSS 7.8
HIGH This Week

Use after free in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally.

Microsoft Use After Free Memory Corruption +16
NVD
CVE-2025-48805
EPSS 0% CVSS 7.8
HIGH This Week

Heap-based buffer overflow in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally.

Microsoft Heap Overflow Buffer Overflow +15
NVD
CVE-2025-48804
EPSS 0% CVSS 6.8
MEDIUM This Month

A security vulnerability in Acceptance of extraneous untrusted data with trusted data in Windows BitLocker (CVSS 6.8) that allows an unauthorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Authentication Bypass Windows 10 1507 +14
NVD
CVE-2025-48803
EPSS 0% CVSS 6.7
MEDIUM This Month

A privilege escalation vulnerability (CVSS 6.7) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows 11 22h2 +13
NVD
CVE-2025-48802
EPSS 0% CVSS 6.5
MEDIUM This Month

Improper certificate validation in Windows SMB allows an authorized attacker to perform spoofing over a network.

Microsoft Information Disclosure Windows Server 2022 23h2 +4
NVD
CVE-2025-48800
EPSS 0% CVSS 6.8
MEDIUM This Month

Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

Microsoft Authentication Bypass Windows 10 1607 +13
NVD
CVE-2025-48799
EPSS 0% CVSS 7.8
HIGH POC This Week

Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.

Microsoft Information Disclosure Windows 10 1607 +8
NVD
CVE-2025-48003
EPSS 0% CVSS 6.8
MEDIUM This Month

Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

Microsoft Authentication Bypass Windows 10 22h2 +10
NVD
CVE-2025-48002
EPSS 0% CVSS 5.7
MEDIUM This Month

Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to disclose information over an adjacent network.

Microsoft Information Disclosure Buffer Overflow +3
NVD
CVE-2025-48001
EPSS 0% CVSS 6.8
MEDIUM This Month

Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

Microsoft Authentication Bypass Windows 10 1507 +14
NVD
CVE-2025-48000
EPSS 0% CVSS 7.8
HIGH This Week

Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.

Microsoft Race Condition Denial Of Service +13
NVD
CVE-2025-47999
EPSS 0% CVSS 6.8
MEDIUM This Month

A security vulnerability in Missing synchronization in Windows Hyper-V (CVSS 6.8) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows 10 1607 +12
NVD
CVE-2025-47998
EPSS 0% CVSS 8.8
HIGH This Week

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

Microsoft Heap Overflow Buffer Overflow +8
NVD
CVE-2025-47996
EPSS 0% CVSS 7.8
HIGH This Week

Integer underflow (wrap or wraparound) in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally.

Microsoft Information Disclosure Buffer Overflow +16
NVD
CVE-2025-47994
EPSS 0% CVSS 7.8
HIGH This Week

Deserialization of untrusted data in Microsoft Office allows an unauthorized attacker to elevate privileges locally.

Deserialization Microsoft Office Long Term Servicing Channel +3
NVD
CVE-2025-47993
EPSS 0% CVSS 7.8
HIGH This Week

Improper access control in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.

Microsoft Authentication Bypass Windows Server 2022 23h2 +2
NVD
CVE-2025-47991
EPSS 0% CVSS 7.8
HIGH This Week

Use after free in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally.

Microsoft Use After Free Memory Corruption +13
NVD
CVE-2025-47988
EPSS 0% CVSS 7.5
HIGH This Week

Improper control of generation of code ('code injection') in Azure Monitor Agent allows an unauthorized attacker to execute code over an adjacent network.

Microsoft RCE Code Injection +1
NVD
CVE-2025-47987
EPSS 0% CVSS 7.8
HIGH This Week

Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authorized attacker to elevate privileges locally.

Microsoft Heap Overflow Buffer Overflow +16
NVD
CVE-2025-47986
EPSS 0% CVSS 8.8
HIGH This Week

Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.

Use After Free Memory Corruption Denial Of Service +16
NVD
CVE-2025-47985
EPSS 0% CVSS 7.8
HIGH This Week

A privilege escalation vulnerability in Untrusted pointer dereference in Windows Event Tracing (CVSS 7.8) that allows an authorized attacker. High severity vulnerability requiring prompt remediation.

Microsoft Information Disclosure Windows 10 1607 +15
NVD
CVE-2025-47984
EPSS 0% CVSS 7.5
HIGH This Week

Protection mechanism failure in Windows GDI allows an unauthorized attacker to disclose information over a network.

Microsoft Information Disclosure Windows Server 2008 +15
NVD
CVE-2025-47982
EPSS 0% CVSS 7.8
HIGH This Week

Improper input validation in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally.

Microsoft Information Disclosure Windows 10 1607 +12
NVD
CVE-2025-47981
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network.

Microsoft Heap Overflow Buffer Overflow +16
NVD
CVE-2025-47980
EPSS 0% CVSS 6.2
MEDIUM This Month

Exposure of sensitive information to an unauthorized actor in Windows Imaging Component allows an unauthorized attacker to disclose information locally.

Microsoft Information Disclosure Windows Server 2022 +15
NVD
CVE-2025-47978
EPSS 0% CVSS 6.5
MEDIUM This Month

Out-of-bounds read in Windows Kerberos allows an authorized attacker to deny service over a network.

Microsoft Information Disclosure Buffer Overflow +4
NVD
CVE-2025-47976
EPSS 0% CVSS 7.8
HIGH This Week

Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.

Microsoft Use After Free Memory Corruption +17
NVD
CVE-2025-47975
EPSS 0% CVSS 7.0
HIGH This Week

A privilege escalation vulnerability in Double free in Windows SSDP Service (CVSS 7.0) that allows an authorized attacker. High severity vulnerability requiring prompt remediation.

Microsoft Information Disclosure Windows 10 1809 +15
NVD
CVE-2025-47973
EPSS 0% CVSS 7.8
HIGH This Week

Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.

Buffer Overflow Windows Server 2008 Windows Server 2016 +14
NVD
CVE-2025-47972
EPSS 0% CVSS 8.0
HIGH This Week

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges over a network.

Microsoft Race Condition Information Disclosure +13
NVD
CVE-2025-47971
EPSS 0% CVSS 7.8
HIGH This Week

Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.

Buffer Overflow Windows 10 22h2 Windows 10 1607 +14
NVD
CVE-2025-47178
EPSS 0% CVSS 8.0
HIGH This Week

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to execute code over an adjacent network.

Microsoft SQLi Configuration Manager 2503
NVD
CVE-2025-47159
EPSS 0% CVSS 7.8
HIGH This Week

Protection mechanism failure in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.

Microsoft Information Disclosure Windows 11 22h2 +13
NVD
CVE-2025-33054
EPSS 0% CVSS 8.1
HIGH This Week

A security vulnerability in Insufficient UI warning of dangerous operations in Remote Desktop Client (CVSS 8.1) that allows an unauthorized attacker. High severity vulnerability requiring prompt remediation.

Authentication Bypass Windows 11 24h2 Windows Server 2025 +3
NVD
CVE-2025-26636
EPSS 0% CVSS 5.5
MEDIUM This Month

CVE-2025-26636 is a security vulnerability (CVSS 5.5) that allows an authorized attacker. Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows Server 2025 +2
NVD
CVE-2025-7326
EPSS 0% CVSS 7.0
HIGH This Week

A privilege escalation vulnerability in Weak authentication in EOL ASP.NET Core (CVSS 7.0) that allows an unauthorized attacker. High severity vulnerability requiring prompt remediation.

Microsoft Authentication Bypass
NVD HeroDevs
CVE-2025-42979
EPSS 0% CVSS 5.6
MEDIUM This Month

CVE-2025-42979 is a security vulnerability (CVSS 5.6). Remediation should follow standard vulnerability management procedures.

Microsoft Sap Information Disclosure +1
NVD
CVE-2023-50786
EPSS 0% CVSS 4.1
MEDIUM This Month

A remote code execution vulnerability in Dradis through 4.16.0 (CVSS 4.1). Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Dradis +1
NVD
CVE-2025-45938
EPSS 0% CVSS 5.4
MEDIUM This Month

Akeles Out of Office Assistant for Jira 4.0.1 is vulberable to Cross Site Scripting (XSS) via the Jira fullName parameter.

Microsoft XSS Atlassian +1
NVD
CVE-2025-43713
EPSS 0% CVSS 6.5
MEDIUM This Month

ASNA Assist and ASNA Registrar before 2025-03-31 allow deserialization attacks against .NET remoting. These are Windows system services that support license key management and deprecated Windows network authentication. The services are implemented with .NET remoting and can be exploited via well-known deserialization techniques inherent in the technology. Because the services run with SYSTEM-level rights, exploits can be crafted to achieve escalation of privilege and arbitrary code execution. This affects DataGate for SQL Server 17.0.36.0 and 16.0.89.0, DataGate Component Suite 17.0.36.0 and 16.0.89.0, DataGate Monitor 17.0.26.0 and 16.0.65.0, DataGate WebPak 17.0.37.0 and 16.0.90.0, Monarch for .NET 11.4.50.0 and 10.0.62.0, Encore RPG 4.1.36.0, Visual RPG .NET FW 17.0.37.0 and 16.0.90.0, Visual RPG .NET FW Windows Deployment 17.0.36.0 and 16.0.89.0, WingsRPG 11.0.38.0 and 10.0.95.0, Mobile RPG 11.0.35.0 and 10.0.94.0, Monarch Framework for .NET FW 11.0.36.0 and 10.0.89.0, Browser Terminal 17.0.37.0 and 16.0.90.0, Visual RPG Classic 5.2.7.0 and 5.1.17.0, Visual RPG Deployment 5.2.7.0 and 5.1.17.0, and DataGate Studio 17.0.38.0 and 16.0.104.0.

Deserialization RCE Microsoft +2
NVD
CVE-2025-27461
EPSS 0% CVSS 7.6
HIGH This Week

During startup, the device automatically logs in the EPC2 Windows user without requesting a password.

Microsoft Authentication Bypass Meac300 Fnade4 Firmware +1
NVD
CVE-2025-27460
EPSS 0% CVSS 7.6
HIGH This Week

The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker. This allows an attacker with physical access to the device to use an alternative operating system to interact with the hard drives, completely circumventing the Windows login. The attacker can read from and write to all files on the hard drives.

Microsoft Information Disclosure Meac300 Fnade4 Firmware +1
NVD
CVE-2025-49713
EPSS 0% CVSS 8.8
HIGH POC This Week

Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.

Microsoft Google Memory Corruption +3
NVD GitHub
CVE-2025-36630
EPSS 0% CVSS 8.4
HIGH This Week

In Tenable Nessus versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege.

Microsoft Privilege Escalation Nessus +1
NVD
CVE-2025-49741
EPSS 1% CVSS 7.4
HIGH POC This Week

A security vulnerability in No cwe for this (CVSS 7.4) that allows an unauthorized attacker. Risk factors: public PoC available.

Microsoft Google Information Disclosure +2
NVD Exploit-DB
CVE-2025-53099
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization code within Sentry to maintain persistence to a user's account. With a specially timed requests and redirect flows, an attacker could generate multiple authorization codes that could be used to exchange for access and refresh tokens. This was possible even after de-authorizing the particular application. This issue has been patched in version 25.5.0. Self-hosted Sentry users should upgrade to version 25.5.0 or higher. Sentry SaaS users do not need to take any action.

Microsoft Information Disclosure Sentry
NVD GitHub
CVE-2024-46992
EPSS 0% CVSS 7.8
HIGH PATCH This Week

A remote code execution vulnerability in Electron (CVSS 7.8). High severity vulnerability requiring prompt remediation.

Microsoft Apple Authentication Bypass +3
NVD GitHub
CVE-2025-53013
EPSS 0% CVSS 5.2
MEDIUM PATCH This Month

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. A vulnerability present in versions 0.9.10 through 0.9.16 allows a user to authenticate to a Linux host via Himmelblau using an *invalid* Linux Hello PIN, provided the host is offline. While the user gains access to the local system, Single Sign-On (SSO) fails due to the network being down and the inability to issue tokens (due to a failure to unlock the Hello key). The core issue lies in an incorrect assumption within the `acquire_token_by_hello_for_business_key` function: it was expected to return a `TPMFail` error for an invalid Hello key when offline, but instead, a preceding nonce request resulted in a `RequestFailed` error, leading the system to erroneously transition to an offline success state without validating the Hello key unlock. This impacts systems using Himmelblau for authentication when operating in an offline state with Hello PIN authentication enabled. Rocky Linux 8 (and variants) are not affected by this vulnerability. The problem is resolved in Himmelblau version 0.9.17. A workaround is available for users who cannot immediately upgrade. Disabling Hello PIN authentication by setting `enable_hello = false` in `/etc/himmelblau/himmelblau.conf` will mitigate the vulnerability.

Microsoft Authentication Bypass Suse
NVD GitHub
CVE-2024-52928
EPSS 0% CVSS 9.6
CRITICAL Act Now

Arc before 1.26.1 on Windows has a bypass issue in the site settings that allows websites (with previously granted permissions) to add new permissions when the user clicks anywhere on the website.

Microsoft Authentication Bypass Arc +1
NVD
CVE-2025-34046
EPSS 3% CVSS 10.0
CRITICAL Act Now

An unauthenticated file upload vulnerability exists in the Fanwei E-Office <= v9.4 web management interface. The vulnerability affects the /general/index/UploadFile.php endpoint, which improperly validates uploaded files when invoked with certain parameters (uploadType=eoffice_logo or uploadType=theme). An attacker can exploit this flaw by sending a crafted HTTP POST request to upload arbitrary files without requiring authentication. Successful exploitation could enable remote code execution on the affected server, leading to complete compromise of the web application and potentially the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

File Upload PHP RCE +1
NVD GitHub
CVE-2025-5966
EPSS 2% CVSS 8.1
HIGH This Week

Zohocorp ManageEngine Exchange reporter Plus version 5722 and below are vulnerable to Stored XSS in the Attachments by filename keyword report.

Microsoft XSS Manageengine Exchange Reporter Plus
NVD
CVE-2025-5366
EPSS 2% CVSS 8.1
HIGH This Week

Zohocorp ManageEngine Exchange reporter Plus version 5722 and below are vulnerable to Stored XSS in the Folder-wise read mails with subject report.

Microsoft XSS Manageengine Exchange Reporter Plus
NVD
CVE-2025-49797
EPSS 0% CVSS 7.8
HIGH This Week

CVE-2025-49797 is a privilege escalation vulnerability in multiple Brother device driver installers for Windows that allows a local attacker with limited user privileges to execute arbitrary code with administrative rights without user interaction. The vulnerability affects various Brother printer and multifunction device driver packages across multiple versions. While the CVSS score of 7.8 indicates significant severity, real-world exploitability depends on whether an attacker has local access to a system during driver installation or can manipulate installer processes.

Microsoft Privilege Escalation Windows
NVD
CVE-2025-41255
EPSS 0% CVSS 8.0
HIGH This Week

CVE-2025-41255 is a security vulnerability (CVSS 8.0). High severity vulnerability requiring prompt remediation.

Microsoft Information Disclosure Windows
NVD GitHub
CVE-2025-6557
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Insufficient data validation in DevTools in Google Chrome on Windows prior to 138.0.7204.49 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)

Microsoft Google XSS +6
NVD
CVE-2025-36537
EPSS 0% CVSS 7.0
HIGH This Week

CVE-2025-36537 is a local privilege escalation vulnerability in TeamViewer Client (Full and Host) and Tensor prior to version 15.67 on Windows that allows an unprivileged local user to delete arbitrary files with SYSTEM privileges by exploiting improper permission assignment in the MSI rollback mechanism. The vulnerability is limited to Remote Management features (Backup, Monitoring, and Patch Management), has a CVSS score of 7.0, and requires local access with medium attack complexity but no user interaction. This vulnerability represents a significant elevation-of-privilege risk for organizations relying on TeamViewer for remote management.

Microsoft Information Disclosure Windows
NVD
CVE-2025-2828
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

A remote code execution vulnerability in langchain-ai/langchain (CVSS 10.0). Risk factors: public PoC available. Vendor patch is available.

Microsoft SSRF Langchain +2
NVD GitHub
CVE-2025-6513
EPSS 0% CVSS 9.3
CRITICAL Act Now

CVE-2025-6513 is a local privilege escalation vulnerability in the BRAIN2 application where standard Windows users can access and decrypt the application's database configuration file without authentication. This allows unprivileged local users to obtain database credentials and potentially compromise sensitive data, with a CVSS score of 9.3 indicating critical severity. The vulnerability affects system confidentiality, integrity, and availability across trust boundaries.

Microsoft Information Disclosure Windows +1
NVD
CVE-2025-52488
EPSS 15% CVSS 8.6
HIGH POC PATCH THREAT Act Now

DNN (DotNetNuke) CMS versions 6.0.0 through 10.0.0 contain a vulnerability that can expose NTLM hashes to a third-party SMB server. Through a specially crafted series of interactions, an attacker can force the DNN server to authenticate to an attacker-controlled SMB server, capturing NTLM credential hashes for offline cracking.

Microsoft Information Disclosure Dotnetnuke
NVD GitHub
CVE-2025-52487
EPSS 0% CVSS 7.5
HIGH PATCH This Week

CVE-2025-52487 is an authentication bypass vulnerability in DNN (DotNetNuke) versions 7.0.0 through 10.0.0 that allows attackers to circumvent IP-based login filters by crafting specially designed requests or using proxy techniques. An unauthenticated remote attacker can bypass IP whitelist restrictions to attempt logins from unauthorized locations, potentially gaining unauthorized access to administrative accounts. The vulnerability has been patched in version 10.0.1 and carries a CVSS 7.5 score reflecting high integrity impact, though no public exploitation or active KEV listing has been reported at this time.

Microsoft Authentication Bypass Dotnetnuke
NVD GitHub
CVE-2025-52486
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows specially crafted content in URLs to be used with TokenReplace and not be properly sanitized by some SkinObjects. This issue has been patched in version 10.0.1.

Microsoft XSS Dotnetnuke
NVD GitHub
CVE-2025-52485
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows a specially crafted request to inject scripts in the Activity Feed Attachments endpoint which will then render in the feed. This issue has been patched in version 10.0.1.

Microsoft XSS Dotnetnuke
NVD GitHub
CVE-2025-49715
EPSS 0% CVSS 7.5
HIGH This Week

CVE-2025-49715 is a private personal information disclosure vulnerability in Microsoft Dynamics 365 FastTrack Implementation Assets that allows unauthenticated network-based attackers to access sensitive user data without any user interaction. The vulnerability has a CVSS score of 7.5 (High) with confirmed high confidentiality impact, and affects organizations using Dynamics 365 FastTrack resources. Given the network-accessible nature and lack of authentication requirements, this poses significant risk to enterprise customer data security.

Information Disclosure Microsoft Dynamics 365
NVD
CVE-2024-45208
EPSS 1% CVSS 9.8
CRITICAL Act Now

Critical remote code execution vulnerability in Versa Director SD-WAN orchestration platform affecting the Cisco NCS application service bound to TCP ports 4566 and 4570. An unauthenticated network attacker can exploit weak HA authentication mechanisms to gain unauthorized administrative access and execute arbitrary code with CVSS 9.8 severity. While no active exploitation has been confirmed, third-party proof-of-concept code has been publicly disclosed, significantly elevating real-world risk.

Microsoft RCE Cisco
NVD
CVE-2025-6240
EPSS 0% CVSS 5.0
MEDIUM This Month

Improper Input Validation vulnerability in Profisee on Windows (filesystem modules) allows Path Traversal after authentication to the Profisee system.This issue affects Profisee: from 2020R1 before 2024R2.

Microsoft Path Traversal Windows
NVD
CVE-2022-49986
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq storvsc_error_wq workqueue should not be marked as WQ_MEM_RECLAIM as it doesn't need to make forward progress under memory pressure. Marking this workqueue as WQ_MEM_RECLAIM may cause deadlock while flushing a non-WQ_MEM_RECLAIM workqueue. In the current state it causes the following warning: [ 14.506347] ------------[ cut here ]------------ [ 14.506354] workqueue: WQ_MEM_RECLAIM storvsc_error_wq_0:storvsc_remove_lun is flushing !WQ_MEM_RECLAIM events_freezable_power_:disk_events_workfn [ 14.506360] WARNING: CPU: 0 PID: 8 at <-snip->kernel/workqueue.c:2623 check_flush_dependency+0xb5/0x130 [ 14.506390] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.4.0-1086-azure #91~18.04.1-Ubuntu [ 14.506391] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022 [ 14.506393] Workqueue: storvsc_error_wq_0 storvsc_remove_lun [ 14.506395] RIP: 0010:check_flush_dependency+0xb5/0x130 <-snip-> [ 14.506408] Call Trace: [ 14.506412] __flush_work+0xf1/0x1c0 [ 14.506414] __cancel_work_timer+0x12f/0x1b0 [ 14.506417] ? kernfs_put+0xf0/0x190 [ 14.506418] cancel_delayed_work_sync+0x13/0x20 [ 14.506420] disk_block_events+0x78/0x80 [ 14.506421] del_gendisk+0x3d/0x2f0 [ 14.506423] sr_remove+0x28/0x70 [ 14.506427] device_release_driver_internal+0xef/0x1c0 [ 14.506428] device_release_driver+0x12/0x20 [ 14.506429] bus_remove_device+0xe1/0x150 [ 14.506431] device_del+0x167/0x380 [ 14.506432] __scsi_remove_device+0x11d/0x150 [ 14.506433] scsi_remove_device+0x26/0x40 [ 14.506434] storvsc_remove_lun+0x40/0x60 [ 14.506436] process_one_work+0x209/0x400 [ 14.506437] worker_thread+0x34/0x400 [ 14.506439] kthread+0x121/0x140 [ 14.506440] ? process_one_work+0x400/0x400 [ 14.506441] ? kthread_park+0x90/0x90 [ 14.506443] ret_from_fork+0x35/0x40 [ 14.506445] ---[ end trace 2d9633159fdc6ee7 ]---

Microsoft Information Disclosure Ubuntu +5
NVD
CVE-2022-49976
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

CVE-2022-49976 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Microsoft Linux Information Disclosure +8
NVD
CVE-2022-49963
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

CVE-2022-49963 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Microsoft Buffer Overflow Linux +6
NVD
CVE-2025-48993
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.123 and 25.0.27, a malicious JavaScript payload can be executed via the Look and Feel formatting fields. Any user can update their Look and Feel Formatting input fields, but the web application does not sanitize their input. This could result in a reflected cross-site scripting (XSS) attack. This issue has been patched in versions 6.8.123 and 25.0.27.

Microsoft XSS Group Office
NVD GitHub
CVE-2025-48992
EPSS 0% CVSS 4.8
MEDIUM POC PATCH This Month

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.123 and 25.0.27, a stored and blind cross-site scripting (XSS) vulnerability exists in the Name Field of the user profile. A malicious attacker can change their name to a javascript payload, which is executed when a user adds the malicious user to their Synchronization > Address books. This issue has been patched in versions 6.8.123 and 25.0.27.

Microsoft XSS Group Office
NVD GitHub
CVE-2025-49124
EPSS 0% CVSS 8.4
HIGH PATCH This Week

A security vulnerability in Apache Tomcat installer for Windows (CVSS 8.4). High severity vulnerability requiring prompt remediation.

Microsoft Apache Tomcat +3
NVD HeroDevs GitHub
CVE-2025-36632
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation vulnerability in Tenable Agent for Windows (versions prior to 10.8.5) that allows a non-administrative local user to execute arbitrary code with SYSTEM-level privileges. This is a local privilege escalation (LPE) vulnerability with high severity (CVSS 7.8) requiring only local access and low complexity exploitation. The vulnerability represents a critical risk in multi-user Windows environments where standard users could gain complete system control.

Microsoft Information Disclosure Nessus Agent +1
NVD
CVE-2025-36633
EPSS 0% CVSS 8.8
HIGH This Week

Local privilege escalation vulnerability in Tenable Agent for Windows (versions prior to 10.8.5) that allows non-administrative users to arbitrarily delete system files with SYSTEM privileges. This vulnerability has a CVSS score of 8.8 (High) and could enable local attackers to compromise system integrity and gain elevated privileges. The attack requires local access but no user interaction, making it a significant risk for multi-user Windows systems running vulnerable Tenable Agent versions.

Microsoft Privilege Escalation Nessus Agent +1
NVD
CVE-2025-36631
EPSS 0% CVSS 8.4
HIGH This Week

Privilege escalation vulnerability in Tenable Agent for Windows (versions prior to 10.8.5) that allows non-administrative users to overwrite arbitrary system files with log content while executing at SYSTEM privilege level. This vulnerability enables local attackers without admin rights to achieve arbitrary file write operations with elevated privileges, potentially leading to system compromise. The vulnerability has a CVSS score of 8.4 (High) and affects Windows deployments; patch availability exists in version 10.8.5 and later.

Microsoft Information Disclosure Nessus Agent +1
NVD
CVE-2025-5491
EPSS 1% CVSS 8.8
HIGH This Week

Remote code execution vulnerability in Acer ControlCenter that exploits a misconfigured Windows Named Pipe to allow authenticated attackers with low privileges to execute arbitrary code with SYSTEM-level permissions. The vulnerability has a CVSS score of 8.8 (High) and requires only network access and low privileges, making it a significant elevation-of-privilege vector; real-world exploitation likelihood depends on confirmation of active KEV listing and public exploit availability.

Microsoft RCE Windows
NVD
CVE-2025-47959
EPSS 0% CVSS 7.1
HIGH This Week

Command injection vulnerability in Visual Studio that allows an authenticated attacker with local user interaction to execute arbitrary code over a network with high impact on confidentiality, integrity, and availability. While the vulnerability requires prior authorization and user interaction, successful exploitation could lead to complete system compromise. No public indication of active exploitation or widespread POC availability is currently documented, but the CVSS 7.1 score reflects significant risk in collaborative development environments where multiple authorized users access shared Visual Studio instances.

Command Injection Microsoft Windows +2
NVD
CVE-2025-30399
EPSS 0% CVSS 7.5
HIGH PATCH This Week

CVE-2025-30399 is an untrusted search path vulnerability in .NET and Visual Studio that allows unauthenticated remote attackers to execute arbitrary code through a network vector, requiring user interaction. The vulnerability affects multiple versions of .NET Framework and Visual Studio across Windows platforms. While the CVSS score is 7.5 (high), the attack complexity is high and requires user interaction, potentially limiting real-world exploitation frequency.

Microsoft Dotnet RCE +5
NVD GitHub
CVE-2025-0913
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink.

Microsoft Information Disclosure Ubuntu +4
NVD
CVE-2025-26383
EPSS 0% CVSS 6.3
MEDIUM This Month

A security vulnerability in The (CVSS 6.3). Remediation should follow standard vulnerability management procedures.

Microsoft Information Disclosure Windows
NVD
CVE-2025-49148
EPSS 0% CVSS 7.3
HIGH This Week

DLL hijacking vulnerability in ClipShare Server for Windows (versions prior to 3.8.5) that allows local, non-privileged users to achieve arbitrary code execution and potential privilege escalation by placing malicious DLLs in the application directory. The vulnerability exploits Windows' default DLL search order, where the application directory is searched before system paths, and poses a reliable privilege escalation risk when ClipShare is run by elevated users. This is a local attack requiring write access to the installation directory.

Microsoft RCE Privilege Escalation +1
NVD GitHub
CVE-2025-32711
EPSS 3% CVSS 9.3
CRITICAL POC Act Now

CVE-2025-32711 is an AI command injection vulnerability in Microsoft 365 Copilot that enables unauthenticated network-based attacks to disclose sensitive information without user interaction. The vulnerability affects M365 Copilot deployments and allows attackers to inject malicious commands that bypass normal authorization controls. With a critical CVSS score of 9.3 and no authentication requirement, this poses an immediate risk to organizations using Copilot features; exploitation status and POC availability require confirmation through Microsoft security advisories.

Command Injection Microsoft Information Disclosure +1
NVD GitHub
CVE-2025-5986
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.

Microsoft Mozilla Information Disclosure +6
NVD
CVE-2024-1244
EPSS 0% CVSS 9.5
CRITICAL Act Now

A remote code execution vulnerability in the OSSEC HIDS agent for Windows (CVSS 9.5) that allows an attacker. Critical severity with potential for significant impact on affected systems.

Microsoft RCE Windows
NVD
CVE-2024-1243
EPSS 1% CVSS 7.2
HIGH POC This Week

CVE-2024-1243 is an improper input validation vulnerability in Wazuh agent for Windows (versions prior to 4.8.0) that allows attackers with control over the Wazuh server or possession of agent keys to redirect agents to malicious UNC paths, resulting in NetNTLMv2 hash leakage. The leaked hash can be relayed for remote code execution or abused for privilege escalation to SYSTEM level via AD CS certificate forging. This vulnerability represents a critical supply-chain/credential-leakage risk for Windows environments using Wazuh, though exploitation requires elevated privileges (high PR requirement) and knowledge of agent keys or server compromise.

Microsoft RCE Wazuh +1
NVD GitHub
CVE-2025-32717
EPSS 0% CVSS 8.4
HIGH This Week

A buffer overflow vulnerability in Heap-based buffer overflow in Microsoft Office Word (CVSS 8.4) that allows an unauthorized attacker. High severity vulnerability requiring prompt remediation.

Microsoft Buffer Overflow Windows +2
NVD
Prev Page 13 of 24 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy