Filtered by vendor Microsoft
Subscriptions
Filtered by product Windows
Subscriptions
Total
8478 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-10221 | 1 Microsoft | 1 Windows | 2025-09-11 | 5.5 Medium |
Insertion of Sensitive Information into Log File (CWE-532) in the ARP Agent component in AxxonSoft Axxon One / AxxonNet 2.0.4 and earlier on Windows platforms allows a local attacker to obtain plaintext credentials via reading TRACE log files containing serialized JSON with passwords. | ||||
CVE-2025-10214 | 1 Microsoft | 1 Windows | 2025-09-11 | N/A |
DLL search path hijacking vulnerability in the UPDF.exe executable for Windows version 1.8.5.0 allows attackers with local access to execute arbitrary code by placing a FREngine.dll file of their choice in the 'C:\Users\<user>\AppData\Local\UPDF\FREngine\Bin64\' directory, which could lead to arbitrary code execution and persistence. | ||||
CVE-2025-10215 | 1 Microsoft | 1 Windows | 2025-09-11 | N/A |
DLL search path hijacking vulnerability in the UPDF.exe executable for Windows version 1.8.5.0 allows attackers with local access to execute arbitrary code by placing a FREngine.dll file of their choice in the 'C:\Users\Public\AppData\Local\UPDF\FREngine\Bin64\' directory, which could lead to arbitrary code execution and persistence. | ||||
CVE-2025-10231 | 2 Microsoft, N-able | 2 Windows, N-central | 2025-09-11 | 7 High |
An Incorrect File Handling Permission bug exists on the N-central Windows Agent and Probe that, in the right circumstances, can allow a local low-level user to run commands with elevated permissions. | ||||
CVE-2025-26646 | 4 Apple, Linux, Microsoft and 1 more | 8 Macos, Linux Kernel, .net and 5 more | 2025-09-10 | 8 High |
External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network. | ||||
CVE-2025-48807 | 1 Microsoft | 17 Hyper-v, Server, Windows and 14 more | 2025-09-09 | 6.7 Medium |
Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally. | ||||
CVE-2025-55231 | 1 Microsoft | 9 Server, Windows, Windows Server and 6 more | 2025-09-09 | 7.5 High |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Storage allows an unauthorized attacker to execute code over a network. | ||||
CVE-2025-55229 | 1 Microsoft | 5 Windows, Windows 10, Windows 11 and 2 more | 2025-09-09 | 5.3 Medium |
Improper verification of cryptographic signature in Windows Certificates allows an unauthorized attacker to perform spoofing over a network. | ||||
CVE-2025-53789 | 1 Microsoft | 17 Server, Windows, Windows 10 1507 and 14 more | 2025-09-09 | 7.8 High |
Missing authentication for critical function in Windows StateRepository API allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-53779 | 1 Microsoft | 4 Server, Windows, Windows Server and 1 more | 2025-09-09 | 7.2 High |
Relative path traversal in Windows Kerberos allows an authorized attacker to elevate privileges over a network. | ||||
CVE-2025-53778 | 1 Microsoft | 21 Windows, Windows 10, Windows 10 1507 and 18 more | 2025-09-09 | 8.8 High |
Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network. | ||||
CVE-2025-50155 | 1 Microsoft | 19 Server, Windows, Windows 10 1507 and 16 more | 2025-09-09 | 7.8 High |
Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-50157 | 1 Microsoft | 14 Server, Server Service, Windows and 11 more | 2025-09-09 | 5.7 Medium |
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network. | ||||
CVE-2025-53766 | 1 Microsoft | 20 Gdi+, Gdiplus, Office and 17 more | 2025-09-09 | 9.8 Critical |
Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network. | ||||
CVE-2025-53726 | 1 Microsoft | 21 Server, Windows, Windows 10 and 18 more | 2025-09-09 | 7.8 High |
Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-53725 | 1 Microsoft | 21 Server, Windows, Windows 10 and 18 more | 2025-09-09 | 7.8 High |
Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-53724 | 1 Microsoft | 17 Windows, Windows 10 1507, Windows 10 1607 and 14 more | 2025-09-09 | 7.8 High |
Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-53723 | 2 Microsoft, Windows | 20 Windows, Windows 10, Windows 10 1507 and 17 more | 2025-09-09 | 7.8 High |
Numeric truncation error in Windows Hyper-V allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-53722 | 1 Microsoft | 20 Server, Windows, Windows 10 1507 and 17 more | 2025-09-09 | 7.5 High |
Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network. | ||||
CVE-2025-53721 | 1 Microsoft | 14 Server, Windows, Windows 10 1809 and 11 more | 2025-09-09 | 7 High |
Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. |