Search

Search Results (309516 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-54896 1 Microsoft 12 365, 365 Apps, Excel and 9 more 2025-09-15 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54115 1 Microsoft 7 Hyper-v, Windows, Windows 10 and 4 more 2025-09-15 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2025-54917 1 Microsoft 5 Windows, Windows 10, Windows 11 and 2 more 2025-09-15 4.3 Medium
Protection mechanism failure in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
CVE-2025-55224 1 Microsoft 15 Hyper-v, Windows, Windows 10 and 12 more 2025-09-15 7.8 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally.
CVE-2025-54898 1 Microsoft 12 365, 365 Apps, Excel and 9 more 2025-09-15 7.8 High
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54099 1 Microsoft 5 Windows, Windows 10, Windows 11 and 2 more 2025-09-15 7 High
Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2025-54098 1 Microsoft 5 Windows, Windows 10, Windows 11 and 2 more 2025-09-15 7.8 High
Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2025-53804 1 Microsoft 5 Windows, Windows 10, Windows 11 and 2 more 2025-09-15 5.5 Medium
Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.
CVE-2025-54911 1 Microsoft 6 Bitlocker, Windows, Windows 10 and 3 more 2025-09-15 7.3 High
Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally.
CVE-2025-54900 1 Microsoft 10 365, 365 Apps, Excel and 7 more 2025-09-15 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54097 1 Microsoft 5 Windows, Windows Server, Windows Server 2008 and 2 more 2025-09-15 6.5 Medium
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
CVE-2025-21043 1 Samsung 1 Mobile Devices 2025-09-15 8.8 High
Out-of-bounds write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1 allows remote attackers to execute arbitrary code.
CVE-2025-8575 2 Lws, Wordpress 2 Lws Cleaner, Wordpress 2025-09-15 7.2 High
The LWS Cleaner plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'lws_cl_delete_file' function in all versions up to, and including, 2.4.1.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CVE-2025-3650 2 Jquery, Wordpress 2 Colorbox Plugin, Wordpress 2025-09-15 3.5 Low
The jQuery Colorbox WordPress plugin through 4.6.3 uses the colorbox library, which does not sanitize title attributes on links before using them, allowing users with at least the contributor role to conduct XSS attacks against administrators.
CVE-2025-9086 1 Curl 1 Curl 2025-09-15 7.5 High
1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
CVE-2025-10291 1 Linlinjava 1 Litemall 2025-09-15 6.3 Medium
A weakness has been identified in linlinjava litemall up to 1.8.0. This affects the function WxAftersaleController of the file /wx/aftersale/cancel. Executing manipulation of the argument ID can lead to improper authorization. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-27240 1 Zabbix 1 Zabbix 2025-09-15 N/A
A Zabbix adminitrator can inject arbitrary SQL during the autoremoval of hosts by inserting malicious SQL in the 'Visible name' field.
CVE-2025-27233 2 Microsoft, Zabbix 4 Windows, Zabbix, Zabbix-agent and 1 more 2025-09-15 N/A
Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a Windows system.
CVE-2025-10148 1 Curl 1 Curl 2025-09-15 5.3 Medium
curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content could then be served to all users of that proxy.
CVE-2025-7448 1 Silabs 1 Wi-sun Stack 2025-09-15 N/A
Wi-SUN unexpected 4- Way Handshake packet receptions may lead to predictable keys and potentially leading to Man in the middle (MitM) attack