Search and browse vulnerability records from NVD
Showing 50 of 30474 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
| 7.3 HIGH |
A flaw has been found in itsourcecode Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /index.php. This manipulation of the argument Username causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. |
0.0% | 2025-10-14 | ||
| 6.8 MEDIUM |
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Commands Connectors configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28. |
0.0% | 2025-10-14 | ||
| 7.3 HIGH |
A Cross-Site Request Forgery (CSRF) in the component /endpoints/currency/currency of Wallos v4.1.1 allows attackers to execute arbitrary operations via a crafted GET request. |
0.0% | 2025-10-14 | ||
| 7.5 HIGH |
Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network. |
9.4% | 2025-10-14 | ||
| 7.0 HIGH |
Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally. |
0.0% | 2025-10-14 | ||
| 7.8 HIGH |
Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 8.8 HIGH |
Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network. |
0.4% | 2025-10-14 | ||
| 2.1 LOW |
Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack. |
0.1% | 2025-10-14 | ||
| 8.2 HIGH |
External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 8.2 HIGH |
External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 7.0 HIGH |
Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 5.3 MEDIUM |
Improper verification of cryptographic signature in Github: Playwright allows an unauthorized attacker to perform spoofing over an adjacent network. |
0.0% | 2025-10-14 | ||
|
CVE-2025-59287
KEV
|
9.8 CRITICAL |
Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network. |
74.7% | 2025-10-14 | |
| 7.0 HIGH |
Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. |
1.0% | 2025-10-14 | ||
| 3.3 LOW |
Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally. |
0.1% | 2025-10-14 | ||
| 7.0 HIGH |
Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Improper link resolution before file access ('link following') in XBox Gaming Services allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 3.1 LOW |
Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 7.0 HIGH |
Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
0.0% | 2025-10-14 | ||
| 5.5 MEDIUM |
Exposure of sensitive information to an unauthorized actor in Microsoft Failover Cluster Virtual Driver allows an authorized attacker to disclose information locally. |
0.1% | 2025-10-14 | ||
| 6.5 MEDIUM |
Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. |
0.2% | 2025-10-14 | ||
| 6.2 MEDIUM |
Insertion of sensitive information into log file in Active Directory Federation Services allows an unauthorized attacker to disclose information locally. |
0.1% | 2025-10-14 | ||
| 6.5 MEDIUM |
Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. |
0.2% | 2025-10-14 | ||
| 7.8 HIGH |
Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 5.5 MEDIUM |
Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally. |
0.1% | 2025-10-14 | ||
| 8.1 HIGH |
Improper input validation in JDBC Driver for SQL Server allows an unauthorized attacker to perform spoofing over a network. |
0.1% | 2025-10-14 | ||
| 8.8 HIGH |
Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network. |
0.1% | 2025-10-14 | ||
| 7.5 HIGH |
Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. |
0.2% | 2025-10-14 | ||
| 6.5 MEDIUM |
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Improper link resolution before file access ('link following') in Windows Health and Optimized Experiences Service allows an authorized attacker to elevate privileges locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. |
0.1% | 2025-10-14 | ||
| 8.8 HIGH |
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
3.0% | 2025-10-14 | ||
| 8.4 HIGH |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-10-14 | ||
| 7.1 HIGH |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-10-14 | ||
| 7.1 HIGH |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
0.1% | 2025-10-14 | ||
|
CVE-2025-59230
KEV
|
7.8 HIGH |
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. |
9.5% | 2025-10-14 | |
| 5.5 MEDIUM |
Uncaught exception in Microsoft Office allows an unauthorized attacker to deny service locally. |
0.1% | 2025-10-14 | ||
| 8.8 HIGH |
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
0.2% | 2025-10-14 | ||
| 7.8 HIGH |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
0.1% | 2025-10-14 | ||
| 7.8 HIGH |
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally. |
0.1% | 2025-10-14 |