Filtered by vendor Microsoft
Subscribe
Total
21874 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-24045 | 1 Microsoft | 6 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 3 more | 2025-07-03 | N/A | 8.1 HIGH |
Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. | |||||
CVE-2025-24043 | 1 Microsoft | 1 Windbg | 2025-07-03 | N/A | 7.5 HIGH |
Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network. | |||||
CVE-2025-24035 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-07-03 | N/A | 8.1 HIGH |
Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. | |||||
CVE-2025-21247 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-07-03 | N/A | 4.3 MEDIUM |
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. | |||||
CVE-2025-24071 | 1 Microsoft | 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more | 2025-07-03 | N/A | 6.5 MEDIUM |
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | |||||
CVE-2025-21222 | 1 Microsoft | 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more | 2025-07-03 | N/A | 8.8 HIGH |
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. | |||||
CVE-2025-24060 | 1 Microsoft | 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more | 2025-07-03 | N/A | 7.8 HIGH |
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | |||||
CVE-2025-24062 | 1 Microsoft | 8 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 5 more | 2025-07-03 | N/A | 7.8 HIGH |
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | |||||
CVE-2025-24073 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-07-03 | N/A | 7.8 HIGH |
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | |||||
CVE-2025-26637 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 22h2 and 9 more | 2025-07-03 | N/A | 6.8 MEDIUM |
Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | |||||
CVE-2025-24074 | 1 Microsoft | 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more | 2025-07-03 | N/A | 7.8 HIGH |
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | |||||
CVE-2025-26635 | 1 Microsoft | 8 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 5 more | 2025-07-03 | N/A | 6.5 MEDIUM |
Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network. | |||||
CVE-2025-26639 | 1 Microsoft | 8 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 5 more | 2025-07-03 | N/A | 7.8 HIGH |
Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally. | |||||
CVE-2025-21399 | 1 Microsoft | 1 Edge Update | 2025-07-03 | N/A | 7.4 HIGH |
Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability | |||||
CVE-2023-4509 | 3 Linux, Microsoft, Octopus | 3 Linux Kernel, Windows, Octopus Server | 2025-07-02 | N/A | 4.3 MEDIUM |
It is possible for an API key to be logged in clear text in the audit log file after an invalid login attempt. | |||||
CVE-2024-4811 | 3 Linux, Microsoft, Octopus | 3 Linux Kernel, Windows, Octopus Server | 2025-07-02 | N/A | 2.2 LOW |
In affected versions of Octopus Server under certain conditions, a user with specific role assignments can access restricted project artifacts. | |||||
CVE-2024-6972 | 3 Linux, Microsoft, Octopus | 3 Linux Kernel, Windows, Octopus Server | 2025-07-02 | N/A | 6.5 MEDIUM |
In affected versions of Octopus Server under certain circumstances it is possible for sensitive variables to be printed in the task log in clear-text. | |||||
CVE-2024-7998 | 3 Linux, Microsoft, Octopus | 3 Linux Kernel, Windows, Octopus Server | 2025-07-02 | N/A | 2.6 LOW |
In affected versions of Octopus Server OIDC cookies were using the wrong expiration time which could result in them using the maximum lifespan. | |||||
CVE-2024-1656 | 3 Linux, Microsoft, Octopus | 3 Linux Kernel, Windows, Octopus Server | 2025-07-02 | N/A | 2.6 LOW |
Affected versions of Octopus Server had a weak content security policy. | |||||
CVE-2024-9194 | 3 Linux, Microsoft, Octopus | 3 Linux Kernel, Windows, Octopus Server | 2025-07-02 | N/A | 9.8 CRITICAL |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Linux and Microsoft Windows Octopus Server on Windows, Linux allows SQL Injection.This issue affects Octopus Server: from 2024.1.0 before 2024.1.13038, from 2024.2.0 before 2024.2.9482, from 2024.3.0 before 2024.3.12766. |