CVE-2025-29804 | Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-29803 | Uncontrolled search path element in Visual Studio Tools for Applications and SQL Server Management Studio allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-29802 | Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-29801 | Incorrect default permissions in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-29800 | Improper privilege management in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-2939 | The Ninja Tables – Easy Data Table Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.0.18 via deserialization of untrusted input from the args[callback] parameter . This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute arbitrary functions, though it does not allow user supplied parameters only single functions can be called so the impact is limited. | medium |
CVE-2025-29331 | An issue in MHSanaei 3x-ui before v.2.5.3 and before allows a remote attacker to execute arbitrary code via the management script x-ui passes the no check certificate option to wget when downloading updates | critical |
CVE-2025-27743 | Untrusted search path in System Center allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-27742 | Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally. | medium |
CVE-2025-27741 | Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. | high |
CVE-2025-27740 | Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network. | high |
CVE-2025-27739 | Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-27738 | Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network. | medium |
CVE-2025-27737 | Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally. | high |
CVE-2025-27736 | Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally. | medium |
CVE-2025-27735 | Insufficient verification of data authenticity in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally. | medium |
CVE-2025-27733 | Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. | high |
CVE-2025-27203 | Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed. | critical |
CVE-2025-27099 | Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the tracker names used in the semantic timeframe deletion message. A tracker administrator with a semantic timeframe used by other trackers could use this vulnerability to force other tracker administrators to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740067916 and Tuleap Enterprise Edition 16.4-5 and 16.3-10. | medium |
CVE-2025-27094 | Tuleap is an open-source suite designed to improve software development management and collaboration. A malicious user with access to a tracker could force-reset certain field configurations, leading to potential information loss. The display time attribute for the date field, the size attribute for the multiselectbox field, the default value, number of rows, and columns attributes for the text field, and the default value, size, and max characters attributes for the string field configurations are lost when added as criteria in a saved report. Additionally, in Tuleap Community Edition versions 16.4.99.1739806825 to 16.4.99.1739877910, this issue could be exploited to prevent access to tracker data by triggering a crash. This vulnerability has been fixed in Tuleap Community Edition 16.4.99.1739877910 and Tuleap Enterprise Edition 16.3-9 and 16.4-4. | medium |
CVE-2025-27028 | The Linux deprivileged user vpuser in Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20) can read the entire file system content, including files belonging to other users and having restricted access (like, for example, the root password hash). | medium |
CVE-2025-27027 | A user with vpuser credentials that opens an SSH connection to the device, gets a restricted shell rbash that allows only a small list of allowed commands. This vulnerability enables the user to get a full-featured Linux shell, bypassing the rbash restrictions. | medium |
CVE-2025-2670 | IBM OpenPages 9.0 is vulnerable to information disclosure of sensitive information due to a weaker than expected security for certain REST end points related to workflow feature of OpenPages. An authenticated user is able to obtain certain information about Workflow related configuration and internal state. | medium |
CVE-2025-26664 | Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | medium |
CVE-2025-26663 | Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network. | high |
CVE-2025-26652 | Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. | high |
CVE-2025-26651 | Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | medium |
CVE-2025-26649 | Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-26648 | Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-26647 | Improper input validation in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network. | high |
CVE-2025-26646 | External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network. | high |
CVE-2025-26644 | Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally. | medium |
CVE-2025-26641 | Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network. | high |
CVE-2025-26640 | Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-24986 | Improper isolation or compartmentalization in Azure PromptFlow allows an unauthorized attacker to execute code over a network. | medium |
CVE-2025-24069 | Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | medium |
CVE-2025-24058 | Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | high |
CVE-2025-2330 | The All-in-One Addons for Elementor – WidgetKit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'button+modal' widget in all versions up to, and including, 2.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | medium |
CVE-2025-22952 | elestio memos v0.23.0 is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied URLs, which can be exploited to perform SSRF attacks. | medium |
CVE-2025-22463 | A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt the stored environment password. | high |
CVE-2025-22455 | A hardcoded key in Ivanti Workspace Control before version 10.19.0.0 allows a local authenticated attacker to decrypt stored SQL credentials. | high |
CVE-2025-21221 | Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. | high |
CVE-2025-21205 | Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. | high |
CVE-2025-21203 | Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | medium |
CVE-2025-21197 | Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content. | medium |
CVE-2025-21195 | Improper link resolution before file access ('link following') in Service Fabric allows an authorized attacker to elevate privileges locally. | medium |
CVE-2025-21171 | .NET Remote Code Execution Vulnerability | high |
CVE-2025-21009 | Out-of-bounds read in decoding malformed frame header in libsavsvc.so prior to Android 15 allows local attackers to cause memory corruption. | medium |
CVE-2025-21008 | Out-of-bounds read in decoding frame header in libsavsvc.so prior to Android 15 allows local attackers to cause memory corruption. | medium |
CVE-2025-20678 | In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739. | high |