Search

Search Results (315539 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-59253 1 Microsoft 20 Windows, Windows 10, Windows 10 1507 and 17 more 2025-10-24 5.5 Medium
Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally.
CVE-2025-59230 1 Microsoft 21 Remote, Windows, Windows 10 and 18 more 2025-10-24 7.8 High
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
CVE-2025-59248 1 Microsoft 3 Exchange, Exchange Server, Exchange Srv 2025-10-24 7.5 High
Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-59244 1 Microsoft 20 Windows, Windows 10, Windows 10 1507 and 17 more 2025-10-24 6.5 Medium
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.
CVE-2023-5217 8 Apple, Debian, Fedoraproject and 5 more 15 Ipados, Iphone Os, Debian Linux and 12 more 2025-10-24 8.8 High
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2025-59241 1 Microsoft 4 Windows, Windows 11, Windows 11 24h2 and 1 more 2025-10-24 7.8 High
Improper link resolution before file access ('link following') in Windows Health and Optimized Experiences Service allows an authorized attacker to elevate privileges locally.
CVE-2025-59238 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-10-24 7.8 High
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-59232 1 Microsoft 14 365, 365 Apps, Access and 11 more 2025-10-24 7.1 High
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
CVE-2025-59229 1 Microsoft 4 365, 365 Apps, Office and 1 more 2025-10-24 5.5 Medium
Uncaught exception in Microsoft Office allows an unauthorized attacker to deny service locally.
CVE-2025-59227 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-10-24 7.8 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2024-4671 2 Fedoraproject, Google 2 Fedora, Chrome 2025-10-24 9.6 Critical
Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CVE-2025-59226 1 Microsoft 6 365, 365 Apps, Office 2021 and 3 more 2025-10-24 7.8 High
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
CVE-2025-59225 1 Microsoft 8 365, 365 Apps, Excel and 5 more 2025-10-24 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-59224 1 Microsoft 11 365, 365 Apps, Excel and 8 more 2025-10-24 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-59223 1 Microsoft 10 365, 365 Apps, Excel and 7 more 2025-10-24 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-59222 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-10-24 7.8 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2024-4761 2 Fedoraproject, Google 2 Fedora, Chrome 2025-10-24 7.5 High
Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
CVE-2025-59221 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-10-24 7 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-59214 1 Microsoft 20 Windows, Windows 10, Windows 10 1507 and 17 more 2025-10-24 6.5 Medium
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-59213 1 Microsoft 4 Configuration Manager, Configuration Manager 2403, Configuration Manager 2409 and 1 more 2025-10-24 8.4 High
Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an unauthorized attacker to elevate privileges locally.