Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Windows
Total 8715 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-55541 3 Acronis, Linux, Microsoft 3 Cyber Protect, Linux Kernel, Windows 2025-03-06 N/A 6.1 MEDIUM
Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39169.
CVE-2024-4017 2 Beyondtrust, Microsoft 2 U-series Appliance, Windows 2025-03-06 N/A 8.8 HIGH
Improper Privilege Management vulnerability in BeyondTrust U-Series Appliance on Windows, 64 bit (filesystem modules) allows DLL Side-Loading.This issue affects U-Series Appliance: from 3.4 before 4.0.3.
CVE-2023-34058 4 Debian, Fedoraproject, Microsoft and 1 more 5 Debian Linux, Fedora, Windows and 2 more 2025-03-06 N/A 7.1 HIGH
VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
CVE-2023-25144 2 Microsoft, Trendmicro 2 Windows, Apex One 2025-03-06 N/A 7.8 HIGH
An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership.
CVE-2024-55540 2 Acronis, Microsoft 2 Cyber Protect, Windows 2025-03-06 N/A 7.8 HIGH
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169.
CVE-2024-55543 2 Acronis, Microsoft 2 Cyber Protect, Windows 2025-03-06 N/A 7.8 HIGH
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 16 (Windows) before build 39169.
CVE-2023-25148 2 Microsoft, Trendmicro 2 Windows, Apex One 2025-03-05 N/A 7.8 HIGH
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to exploit the vulnerability by changing a specific file into a pseudo-symlink, allowing privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2023-25147 2 Microsoft, Trendmicro 2 Windows, Apex One 2025-03-05 N/A 6.7 MEDIUM
An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process. Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this.
CVE-2023-25146 2 Microsoft, Trendmicro 2 Windows, Apex One 2025-03-05 N/A 7.8 HIGH
A security agent link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to quarantine a file, delete the original folder and replace with a junction to an arbitrary location, ultimately leading to an arbitrary file dropped to an arbitrary location. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2023-25145 2 Microsoft, Trendmicro 2 Windows, Apex One 2025-03-05 N/A 7.8 HIGH
A link following vulnerability in the scanning function of Trend Micro Apex One agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2023-25143 2 Microsoft, Trendmicro 2 Windows, Apex One 2025-03-05 N/A 9.8 CRITICAL
An uncontrolled search path element vulnerability in the Trend Micro Apex One Server installer could allow an attacker to achieve a remote code execution state on affected products.
CVE-2023-5993 2 Microsoft, Thalesgroup 2 Windows, Safenet Authentication Client 2025-03-04 N/A 7.8 HIGH
A flaw in the Windows Installer in Thales SafeNet Authentication Client prior to 10.8 R10 on Windows allows an attacker to escalate their privilege level via local access.
CVE-2023-7016 2 Microsoft, Thalesgroup 2 Windows, Safenet Authentication Client 2025-03-04 N/A 7.8 HIGH
A flaw in Thales SafeNet Authentication Client prior to 10.8 R10 on Windows allows an attacker to execute code at a SYSTEM level via local access.
CVE-2024-0197 2 Microsoft, Thalesgroup 2 Windows, Sentinel Hasp Ldk 2025-03-04 N/A 7.8 HIGH
A flaw in the installer for Thales SafeNet Sentinel HASP LDK prior to 9.16 on Windows allows an attacker to escalate their privilege level via local access.
CVE-2024-0819 4 Apple, Linux, Microsoft and 1 more 4 Macos, Linux Kernel, Windows and 1 more 2025-03-03 N/A 7.3 HIGH
Improper initialization of default settings in TeamViewer Remote Client prior version 15.51.5 for Windows, Linux and macOS, allow a low privileged user to elevate privileges by changing the personal password setting and establishing a remote connection to a logged-in admin account.
CVE-2024-52053 3 Linux, Microsoft, Wowza 3 Linux Kernel, Windows, Streaming Engine 2025-03-03 N/A 9.6 CRITICAL
Stored Cross-Site Scripting in the Manager component of Wowza Streaming Engine below 4.9.1 allows an unauthenticated attacker to inject client-side JavaScript into the web dashboard to automatically hijack admin accounts.
CVE-2024-52054 3 Linux, Microsoft, Wowza 3 Linux Kernel, Windows, Streaming Engine 2025-03-03 N/A 2.7 LOW
Path Traversal in the Manager component of Wowza Streaming Engine below 4.9.1 allows an administrator user to create an XML definition file anywhere on the file system.
CVE-2024-52055 3 Linux, Microsoft, Wowza 3 Linux Kernel, Windows, Streaming Engine 2025-03-03 N/A 4.9 MEDIUM
Path Traversal in the Manager component of Wowza Streaming Engine below 4.9.1 allows an administrator user to read any file on the file system if the target directory contains an XML definition file.
CVE-2024-52056 3 Linux, Microsoft, Wowza 3 Linux Kernel, Windows, Streaming Engine 2025-03-03 N/A 6.5 MEDIUM
Path Traversal in the Manager component of Wowza Streaming Engine below 4.9.1 allows an administrator user to delete any directory on the file system if the target directory contains an XML definition file.
CVE-2025-21155 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2025-03-03 N/A 5.5 MEDIUM
Substance3D - Stager versions 3.1.0 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.