Search Results (74212 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-59500 1 Microsoft 2 Azure, Azure Notification Service 2026-02-22 7.7 High
Improper access control in Azure Notification Service allows an authorized attacker to elevate privileges over a network.
CVE-2025-59273 1 Microsoft 3 Azure, Azure Event Grid, Azure Event Grid System 2026-02-22 7.3 High
Improper access control in Azure Event Grid allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-59271 1 Microsoft 3 Azure Cache For Redis, Azure Cache For Redis Enterprise, Azure Managed Redis 2026-02-22 8.7 High
Redis Enterprise Elevation of Privilege Vulnerability
CVE-2025-59247 1 Microsoft 2 Azure, Azure Playfab 2026-02-22 8.8 High
Azure PlayFab Elevation of Privilege Vulnerability
CVE-2025-59497 2 Linux, Microsoft 2 Linux, Defender For Endpoint 2026-02-22 7 High
Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally.
CVE-2025-59289 1 Microsoft 19 Windows, Windows 10, Windows 10 21h2 and 16 more 2026-02-22 7 High
Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.
CVE-2025-59285 1 Microsoft 3 Azure, Azure Monitor, Azure Monitor Agent 2026-02-22 7 High
Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
CVE-2025-59278 1 Microsoft 28 Windows, Windows 10, Windows 10 1507 and 25 more 2026-02-22 7.8 High
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
CVE-2025-59275 1 Microsoft 28 Windows, Windows 10, Windows 10 1507 and 25 more 2026-02-22 7.8 High
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.
CVE-2025-59261 1 Microsoft 16 Graphics Component, Windows, Windows 11 and 13 more 2026-02-22 7 High
Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
CVE-2025-59230 1 Microsoft 31 Remote, Windows, Windows 10 and 28 more 2026-02-22 7.8 High
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
CVE-2025-59248 1 Microsoft 6 Exchange, Exchange Server, Exchange Server 2016 and 3 more 2026-02-22 7.5 High
Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-59241 1 Microsoft 6 Windows, Windows 11, Windows 11 24h2 and 3 more 2026-02-22 7.8 High
Improper link resolution before file access ('link following') in Windows Health and Optimized Experiences Service allows an authorized attacker to elevate privileges locally.
CVE-2025-59238 1 Microsoft 10 365, 365 Apps, Office and 7 more 2026-02-22 7.8 High
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-59232 1 Microsoft 19 365, 365 Apps, Access and 16 more 2026-02-22 7.1 High
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
CVE-2025-59227 1 Microsoft 12 365, 365 Apps, Office and 9 more 2026-02-22 7.8 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-59226 1 Microsoft 6 365, 365 Apps, Office 2021 and 3 more 2026-02-22 7.8 High
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
CVE-2025-59225 1 Microsoft 12 365, 365 Apps, Excel and 9 more 2026-02-22 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-59224 1 Microsoft 13 365, 365 Apps, Excel and 10 more 2026-02-22 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-59223 1 Microsoft 13 365, 365 Apps, Excel and 10 more 2026-02-22 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.