Filtered by vendor Microsoft Subscriptions
Filtered by product Windows Subscriptions
Total 8478 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-50158 1 Microsoft 19 Windows, Windows 10 1507, Windows 10 1607 and 16 more 2025-09-09 7 High
Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally.
CVE-2025-50156 1 Microsoft 13 Server, Windows, Windows 2008 and 10 more 2025-09-09 5.7 Medium
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.
CVE-2025-50154 1 Microsoft 19 Windows, Windows 10 1507, Windows 10 1607 and 16 more 2025-09-09 7.5 High
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-50153 1 Microsoft 19 Server, Windows, Windows 10 and 16 more 2025-09-09 7.8 High
Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally.
CVE-2025-49762 1 Microsoft 21 Windows, Windows 10, Windows 10 1507 and 18 more 2025-09-09 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2025-49761 1 Microsoft 21 Server, Windows, Windows 10 1507 and 18 more 2025-09-09 7.8 High
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2025-49757 1 Microsoft 14 Server, Windows, Windows 2008 and 11 more 2025-09-09 8.8 High
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
CVE-2025-49743 1 Microsoft 21 Windows, Windows 10, Windows 10 1507 and 18 more 2025-09-09 6.7 Medium
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
CVE-2025-55230 1 Microsoft 5 Windows, Windows 10, Windows 11 and 2 more 2025-09-09 7.8 High
Untrusted pointer dereference in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally.
CVE-2025-49751 1 Microsoft 19 Hyper-v, Server, Windows and 16 more 2025-09-09 6.8 Medium
Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.
CVE-2025-21172 4 Apple, Linux, Microsoft and 1 more 9 Macos, Linux Kernel, .net and 6 more 2025-09-09 7.5 High
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2025-21176 4 Apple, Linux, Microsoft and 1 more 22 Macos, Linux Kernel, .net and 19 more 2025-09-09 8.8 High
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVE-2025-21171 4 Apple, Linux, Microsoft and 1 more 7 Macos, Linux Kernel, .net and 4 more 2025-09-09 7.5 High
.NET Remote Code Execution Vulnerability
CVE-2025-59033 1 Microsoft 7 Windows, Windows 10, Windows 11 and 4 more 2025-09-09 9.8 Critical
The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. On systems that do not have hypervisor-protected code integrity (HVCI) enabled, entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate’s TBS hash along with a 'FileAttribRef' qualifier (such as file name or version) will not be blocked. This vulnerability affects any Windows system that does not have HVCI enabled or supported (HVCI is available in Windows 10, Windows 11, and Windows Server 2016 and later). NOTE: The vendor states that the driver blocklist is intended for use with HVCI, while systems without HVCI should use App Control, and any custom blocklist entries require a granular approach for proper enforcement.
CVE-2022-50238 1 Microsoft 1 Windows 2025-09-09 N/A
The on-endpoint Microsoft vulnerable driver blocklist is not fully synchronized with the online Microsoft recommended driver block rules. Some entries present on the online list have been excluded from the on-endpoint blocklist longer than the expected periodic monthly Windows updates. It is possible to fully synchronize the driver blocklist using WDAC policies. NOTE: The vendor explains that Windows Update provides a smaller, compatibility-focused driver blocklist for general users, while the full XML list is available for advanced users and organizations to customize at the risk of usability issues.
CVE-2025-30642 2 Microsoft, Trendmicro 2 Windows, Deep Security Agent 2025-09-09 5.5 Medium
A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to create a denial of service (DoS) situation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2025-30641 2 Microsoft, Trendmicro 2 Windows, Deep Security Agent 2025-09-09 7.8 High
A link following vulnerability in the anti-malware solution portion of Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2025-30640 2 Microsoft, Trendmicro 2 Windows, Deep Security Agent 2025-09-09 7.8 High
A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2024-55955 2 Microsoft, Trendmicro 2 Windows, Deep Security Agent 2025-09-09 6.7 Medium
An incorrect permissions assignment vulnerability in Trend Micro Deep Security 20.0 agents between versions 20.0.1-9400 and 20.0.1-23340 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2025-49218 2 Microsoft, Trendmicro 3 Windows, Endpoint Encryption Policy Server, Trend Micro Endpoint Encryption 2025-09-08 7.7 High
A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. This is similar to, but not identical to CVE-2025-49215. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.