Search

Search Results (309535 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-54904 1 Microsoft 13 365, 365 Apps, Excel and 10 more 2025-09-15 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54091 1 Microsoft 6 Hyper-v, Windows, Windows 10 and 3 more 2025-09-15 7.8 High
Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2025-54901 1 Microsoft 8 365, 365 Apps, Excel and 5 more 2025-09-15 5.5 Medium
Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
CVE-2025-55227 1 Microsoft 5 Sql Server, Sql Server 2016, Sql Server 2017 and 2 more 2025-09-15 8.8 High
Improper neutralization of special elements used in a command ('command injection') in SQL Server allows an authorized attacker to elevate privileges over a network.
CVE-2025-53809 1 Microsoft 4 Windows, Windows 11, Windows Server and 1 more 2025-09-15 6.5 Medium
Improper input validation in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to deny service over a network.
CVE-2025-54896 1 Microsoft 12 365, 365 Apps, Excel and 9 more 2025-09-15 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54115 1 Microsoft 7 Hyper-v, Windows, Windows 10 and 4 more 2025-09-15 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2025-54917 1 Microsoft 5 Windows, Windows 10, Windows 11 and 2 more 2025-09-15 4.3 Medium
Protection mechanism failure in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
CVE-2025-55224 1 Microsoft 15 Hyper-v, Windows, Windows 10 and 12 more 2025-09-15 7.8 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally.
CVE-2025-54898 1 Microsoft 12 365, 365 Apps, Excel and 9 more 2025-09-15 7.8 High
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54099 1 Microsoft 5 Windows, Windows 10, Windows 11 and 2 more 2025-09-15 7 High
Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2025-54098 1 Microsoft 5 Windows, Windows 10, Windows 11 and 2 more 2025-09-15 7.8 High
Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2025-53804 1 Microsoft 5 Windows, Windows 10, Windows 11 and 2 more 2025-09-15 5.5 Medium
Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.
CVE-2025-54911 1 Microsoft 6 Bitlocker, Windows, Windows 10 and 3 more 2025-09-15 7.3 High
Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally.
CVE-2025-54900 1 Microsoft 10 365, 365 Apps, Excel and 7 more 2025-09-15 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54097 1 Microsoft 5 Windows, Windows Server, Windows Server 2008 and 2 more 2025-09-15 6.5 Medium
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
CVE-2025-21043 1 Samsung 1 Mobile Devices 2025-09-15 8.8 High
Out-of-bounds write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1 allows remote attackers to execute arbitrary code.
CVE-2025-8575 2 Lws, Wordpress 2 Lws Cleaner, Wordpress 2025-09-15 7.2 High
The LWS Cleaner plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'lws_cl_delete_file' function in all versions up to, and including, 2.4.1.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CVE-2025-3650 2 Jquery, Wordpress 2 Colorbox Plugin, Wordpress 2025-09-15 3.5 Low
The jQuery Colorbox WordPress plugin through 4.6.3 uses the colorbox library, which does not sanitize title attributes on links before using them, allowing users with at least the contributor role to conduct XSS attacks against administrators.
CVE-2025-9086 1 Curl 1 Curl 2025-09-15 7.5 High
1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.