Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Windows
Total 8709 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-41234 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 5.0 MEDIUM
NULL pointer dereference in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-42773 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 8.8 HIGH
Improper neutralization in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-45217 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 8.8 HIGH
Improper access control in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-45315 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 5.5 MEDIUM
Improper initialization in some Intel(R) Power Gadget software for Windwos all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-45736 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 6.7 MEDIUM
Insecure inherited permissions in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-46691 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 7.9 HIGH
Use after free in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-45673 3 Ibm, Linux, Microsoft 5 Security Verify Bridge Directory Sync, Security Verify Gateway For Radius, Security Verify Gateway For Windows Login and 2 more 2025-08-27 N/A 5.5 MEDIUM
IBM Security Verify Bridge Directory Sync 1.0.1 through 1.0.12, IBM Security Verify Gateway for Windows Login 1.0.1 through 1.0.10, and IBM Security Verify Gateway for Radius 1.0.1 through 1.0.11 stores user credentials in configuration files which can be read by a local user.
CVE-2025-49385 2 Microsoft, Trendmicro 2 Windows, Maximum Security 2022 2025-08-26 N/A 7.8 HIGH
Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.
CVE-2025-49384 2 Microsoft, Trendmicro 2 Windows, Maximum Security 2022 2025-08-26 N/A 7.8 HIGH
Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.
CVE-2024-24912 2 Checkpoint, Microsoft 2 Harmony Endpoint, Windows 2025-08-26 N/A 6.7 MEDIUM
A local privilege escalation vulnerability has been identified in Harmony Endpoint Security Client for Windows versions E88.10 and below. To exploit this vulnerability, an attacker must first obtain the ability to execute local privileged code on the target system.
CVE-2025-52521 2 Microsoft, Trendmicro 2 Windows, Maximum Security 2022 2025-08-26 N/A 7.8 HIGH
Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.
CVE-2025-4609 2 Google, Microsoft 2 Chrome, Windows 2025-08-25 N/A 9.6 CRITICAL
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 136.0.7103.113 allowed a remote attacker to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)
CVE-2024-47810 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2025-08-25 N/A 8.8 HIGH
A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a 3D page object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
CVE-2024-49576 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2025-08-25 N/A 8.8 HIGH
A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a checkbox CBF_Widget object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
CVE-2024-38864 2 Checkmk, Microsoft 2 Checkmk, Windows 2025-08-25 N/A 3.3 LOW
Incorrect permissions on the Checkmk Windows Agent's data directory in Checkmk < 2.3.0p23, < 2.2.0p38 and <= 2.1.0p49 (EOL) allows a local attacker to read sensitive data.
CVE-2024-29072 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2025-08-22 N/A 8.2 HIGH
A privilege escalation vulnerability exists in the Foxit Reader 2024.2.0.25138. The vulnerability occurs due to improper certification validation of the updater executable before executing it. A low privilege user can trigger the update action which can result in unexpected elevation of privilege.
CVE-2018-25032 12 Apple, Azul, Debian and 9 more 39 Mac Os X, Macos, Zulu and 36 more 2025-08-21 5.0 MEDIUM 7.5 HIGH
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
CVE-2025-9132 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2025-08-21 N/A 8.8 HIGH
Out of bounds write in V8 in Google Chrome prior to 139.0.7258.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-25015 3 Ibm, Linux, Microsoft 5 Aix, Linux On Ibm Z, Mq and 2 more 2025-08-21 N/A 7.5 HIGH
IBM MQ 9.2 LTS, 9.3 LTS, and 9.3 CD Internet Pass-Thru could allow a remote user to cause a denial of service by sending HTTP requests that would consume all available resources. IBM X-Force ID: 281278.
CVE-2025-24789 2 Microsoft, Snowflake 2 Windows, Snowflake Jdbc 2025-08-20 N/A 7.8 HIGH
Snowflake JDBC provides a JDBC type 4 driver that supports core functionality, allowing Java program to connect to Snowflake. Snowflake discovered and remediated a vulnerability in the Snowflake JDBC Driver. When the EXTERNALBROWSER authentication method is used on Windows, an attacker with write access to a directory in the %PATH% can escalate their privileges to the user that runs the vulnerable JDBC Driver version. This vulnerability affects versions 3.2.3 through 3.21.0 on Windows. Snowflake fixed the issue in version 3.22.0.