Search
Search Results (1040 CVEs found)
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-21252 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21251 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 7.5 High |
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | ||||
CVE-2025-21249 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 6.6 Medium |
Windows Digital Media Elevation of Privilege Vulnerability | ||||
CVE-2025-21248 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21244 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21243 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21242 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 5.9 Medium |
Windows Kerberos Information Disclosure Vulnerability | ||||
CVE-2025-21241 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21239 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21237 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21236 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21235 | 1 Microsoft | 8 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 5 more | 2025-09-09 | 7.8 High |
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability | ||||
CVE-2025-21234 | 1 Microsoft | 8 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 5 more | 2025-09-09 | 7.8 High |
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability | ||||
CVE-2025-21233 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21215 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 4.6 Medium |
Secure Boot Security Feature Bypass Vulnerability | ||||
CVE-2025-21214 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 4.2 Medium |
Windows BitLocker Information Disclosure Vulnerability | ||||
CVE-2025-21210 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 4.2 Medium |
Windows BitLocker Information Disclosure Vulnerability | ||||
CVE-2025-21413 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-21411 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-09-09 | 8.8 High |
Windows Telephony Service Remote Code Execution Vulnerability | ||||
CVE-2025-9491 | 1 Microsoft | 2 Windows, Windows 11 23h2 | 2025-09-03 | 7.8 High |
Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373. |