Newest CVEs

IDDescriptionSeverity
CVE-2025-26651Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
medium
CVE-2025-26649Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.
high
CVE-2025-26648Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally.
high
CVE-2025-26647Improper input validation in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.
high
CVE-2025-26644Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally.
medium
CVE-2025-26642Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.
high
CVE-2025-26641Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network.
high
CVE-2025-26640Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
high
CVE-2025-26639Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally.
high
CVE-2025-26637Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
medium
CVE-2025-26635Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.
medium
CVE-2025-26628Insufficiently protected credentials in Azure Local Cluster allows an authorized attacker to disclose information locally.
high
CVE-2025-25002Insertion of sensitive information into log file in Azure Local Cluster allows an authorized attacker to disclose information over an adjacent network.
medium
CVE-2025-24074Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
high
CVE-2025-24073Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
high
CVE-2025-24062Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
high
CVE-2025-24060Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
high
CVE-2025-24058Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
high
CVE-2025-21222Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
high
CVE-2025-21221Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
high
CVE-2025-21205Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
high
CVE-2025-21204Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally.
high
CVE-2025-21203Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
medium
CVE-2025-21197Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content.
medium
CVE-2025-21191Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.
high
CVE-2025-21174Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
high
CVE-2025-32279Missing Authorization vulnerability in Shahjada Live Forms. This issue affects Live Forms: from n/a through 4.8.5.
medium
CVE-2025-32211Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Broadstreet Broadstreet allows Stored XSS. This issue affects Broadstreet: from n/a through 1.51.2.
medium
CVE-2025-32164Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in maennchen1.de m1.DownloadList. This issue affects m1.DownloadList: from n/a through 0.21.
medium
CVE-2025-32117Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Widgetize Pages Light allows Reflected XSS. This issue affects Widgetize Pages Light: from n/a through 3.0.
high
CVE-2025-30671Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
medium
CVE-2025-30670Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access.
medium
CVE-2025-27443Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access.
low
CVE-2025-27442Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access.
medium
CVE-2025-27441Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access.
medium
CVE-2025-27085Multiple vulnerabilities exist in the web-based management interface of AOS-10 GW and AOS-8 Controller/Mobility Conductor. Successful exploitation of these vulnerabilities could allow an authenticated, remote attacker to download arbitrary files from the filesystem of an affected device.
medium
CVE-2025-27084A vulnerability in the Captive Portal of an AOS-10 GW and AOS-8 Controller/Mobility Conductor could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack. Successful exploitation could enable the attacker to execute arbitrary script code in the victim's browser within the context of the affected interface.
medium
CVE-2025-27083Authenticated command injection vulnerabilities exist in the AOS-10 GW and AOS-8 Controller/Mobility Conductor web-based management interface. Successful exploitation of these vulnerabilities allows an Authenticated attacker to execute arbitrary commands as a privileged user on the underlying operating system.
high
CVE-2025-27082Arbitrary File Write vulnerabilities exist in the web-based management interface of both the AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an Authenticated attacker to upload arbitrary files and execute arbitrary commands on the underlying host operating system.
high
CVE-2025-25227Insufficient state checks lead to a vector that allows to bypass 2FA checks.
high
CVE-2025-25226Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used.
medium
CVE-2024-52981An issue was discovered in Elasticsearch, where a large recursion using the Well-KnownText formatted string with nested GeometryCollection objects could cause a stackoverflow.
medium
CVE-2024-52980A flaw was discovered in Elasticsearch, where a large recursion using the innerForbidCircularReferences function of the PatternBank class could cause the Elasticsearch node to crash. A successful attack requires a malicious user to have read_pipeline Elasticsearch cluster privilege assigned to them.
medium
CVE-2024-52974An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash. A successful attack requires a malicious user to have read permissions for Observability assigned to them.
medium
CVE-2024-48887A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request
critical
CVE-2025-3289A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.
high
CVE-2025-3288A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.
high
CVE-2025-3287A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.
high
CVE-2025-3286A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.
high
CVE-2025-3285A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.
high