Search

Search Results (314445 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-55682 2025-10-15 6.1 Medium
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
CVE-2025-55679 2025-10-15 5.1 Medium
Improper input validation in Windows Kernel allows an unauthorized attacker to disclose information locally.
CVE-2025-55337 2025-10-15 6.1 Medium
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
CVE-2025-55334 2025-10-15 6.2 Medium
Cleartext storage of sensitive information in Windows Kernel allows an unauthorized attacker to bypass a security feature locally.
CVE-2025-55332 2025-10-15 6.1 Medium
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
CVE-2025-55330 2025-10-15 6.1 Medium
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
CVE-2025-55248 1 Redhat 1 Enterprise Linux 2025-10-15 4.8 Medium
Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.
CVE-2025-53768 2025-10-15 7.8 High
Use after free in Xbox allows an authorized attacker to elevate privileges locally.
CVE-2025-53139 2025-10-15 7.7 High
Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally.
CVE-2025-50175 2025-10-15 7.8 High
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
CVE-2025-53150 2025-10-15 7.8 High
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
CVE-2025-53717 2025-10-15 7 High
Reliance on untrusted inputs in a security decision in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.
CVE-2025-25004 2025-10-15 7.3 High
Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.
CVE-2025-48813 2025-10-15 6.3 Medium
Use of a key past its expiration date in Virtual Secure Mode allows an authorized attacker to perform spoofing locally.
CVE-2025-59502 2025-10-15 7.5 High
Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.
CVE-2025-59494 2025-10-15 7.8 High
Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
CVE-2025-59295 2025-10-15 8.8 High
Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network.
CVE-2025-59294 2025-10-15 2.1 Low
Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack.
CVE-2025-59292 2025-10-15 8.2 High
External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.
CVE-2025-59291 2025-10-15 8.2 High
External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.