Search Results (7376 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-30378 1 Microsoft 1 Sharepoint Server 2025-09-10 7 High
Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.
CVE-2025-29975 1 Microsoft 1 Pc Manager 2025-09-10 7.8 High
Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.
CVE-2025-47181 1 Microsoft 1 Edge Update 2025-09-10 8.8 High
Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally.
CVE-2025-21331 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-09-09 7.3 High
Windows Installer Elevation of Privilege Vulnerability
CVE-2025-21323 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-09-09 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21317 1 Microsoft 8 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 5 more 2025-09-09 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21274 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-09-09 5.5 Medium
Windows Event Tracing Denial of Service Vulnerability
CVE-2025-21224 1 Microsoft 8 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 5 more 2025-09-09 8.1 High
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
CVE-2025-21364 1 Microsoft 2 365 Apps, Office Long Term Servicing Channel 2025-09-09 7.8 High
Microsoft Excel Security Feature Bypass Vulnerability
CVE-2025-21321 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-09-09 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21320 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-09-09 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21319 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-09-09 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21318 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-09-09 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21316 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-09-09 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21309 1 Microsoft 6 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 3 more 2025-09-09 8.1 High
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2025-21294 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-09-09 8.1 High
Microsoft Digest Authentication Remote Code Execution Vulnerability
CVE-2025-41682 1 Bender 4 Cc612, Cc613, Icc13xx and 1 more 2025-09-09 8.8 High
An authenticated, low-privileged attacker can obtain credentials stored on the charge controller including the manufacturer password.
CVE-2025-41701 1 Beckhoff 1 Twincat 2025-09-09 7.8 High
An unauthenticated attacker can trick a local user into executing arbitrary commands by opening a deliberately manipulated project file with an affected engineering tool. These arbitrary commands are executed in the user context.
CVE-2025-49156 1 Trendmicro 3 Apex One, Apexone Op, Apexone Saas 2025-09-09 7 High
A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalation privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2025-49157 1 Trendmicro 3 Apex One, Apexone Op, Apexone Saas 2025-09-09 7.8 High
A link following vulnerability in the Trend Micro Apex One Damage Cleanup Engine could allow a local attacker to escalation privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.