Total
34972 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2024-30061 | 1 Microsoft | 1 Dynamics 365 | 2025-12-09 | 7.3 High |
| Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | ||||
| CVE-2022-24522 | 1 Microsoft | 1 Skype Extension | 2025-12-09 | 6.5 Medium |
| Skype Extension for Chrome Information Disclosure Vulnerability | ||||
| CVE-2022-24526 | 1 Microsoft | 1 Visual Studio Code | 2025-12-09 | 6.1 Medium |
| Visual Studio Code Spoofing Vulnerability | ||||
| CVE-2022-24498 | 1 Microsoft | 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more | 2025-12-09 | 6.5 Medium |
| Windows iSCSI Target Service Information Disclosure Vulnerability | ||||
| CVE-2022-24539 | 1 Microsoft | 4 Windows Server 2016, Windows Server 2019, Windows Server 2022 and 1 more | 2025-12-09 | 8.1 High |
| Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability | ||||
| CVE-2022-24548 | 1 Microsoft | 1 Malware Protection Engine | 2025-12-09 | 5.5 Medium |
| Microsoft Defender Denial of Service Vulnerability | ||||
| CVE-2022-26784 | 1 Microsoft | 6 Windows Server 2012, Windows Server 2012 R2, Windows Server 2016 and 3 more | 2025-12-09 | 6.5 Medium |
| Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability | ||||
| CVE-2025-66324 | 1 Huawei | 1 Harmonyos | 2025-12-09 | 8.4 High |
| Input verification vulnerability in the compression and decompression module. Impact: Successful exploitation of this vulnerability may affect app data integrity. | ||||
| CVE-2025-58279 | 1 Huawei | 1 Harmonyos | 2025-12-09 | 4.4 Medium |
| Permission control vulnerability in the media library module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | ||||
| CVE-2025-66325 | 1 Huawei | 2 Emui, Harmonyos | 2025-12-09 | 6.2 Medium |
| Permission control vulnerability in the package management module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | ||||
| CVE-2025-66329 | 1 Huawei | 2 Emui, Harmonyos | 2025-12-09 | 4 Medium |
| Permission control vulnerability in the window management module. Impact: Successful exploitation of this vulnerability may affect availability. | ||||
| CVE-2025-66557 | 1 Nextcloud | 1 Deck | 2025-12-09 | 5.4 Medium |
| Nextcloud Deck is a kanban style organization tool aimed at personal planning and project organization for teams integrated with Nextcloud. Prior to 1.14.6 and 1.15.2, a bug in the permission logic allowed users with "Can share" permission to modify the permissions of other recipients. This vulnerability is fixed in 1.14.6 and 1.15.2. | ||||
| CVE-2025-66330 | 1 Huawei | 1 Harmonyos | 2025-12-09 | 4.9 Medium |
| App lock verification bypass vulnerability in the file management app. Impact: Successful exploitation of this vulnerability may affect service confidentiality. | ||||
| CVE-2025-66331 | 1 Huawei | 1 Harmonyos | 2025-12-09 | 3.3 Low |
| Denial of service (DoS) vulnerability in the office service. Impact: Successful exploitation of this vulnerability may affect availability. | ||||
| CVE-2025-66334 | 1 Huawei | 1 Harmonyos | 2025-12-09 | 3.3 Low |
| Denial of service (DoS) vulnerability in the office service. Impact: Successful exploitation of this vulnerability may affect availability. | ||||
| CVE-2025-66333 | 1 Huawei | 1 Harmonyos | 2025-12-09 | 3.3 Low |
| Denial of service (DoS) vulnerability in the office service. Impact: Successful exploitation of this vulnerability may affect availability. | ||||
| CVE-2025-66332 | 1 Huawei | 1 Harmonyos | 2025-12-09 | 3.3 Low |
| Denial of service (DoS) vulnerability in the office service. Impact: Successful exploitation of this vulnerability may affect availability. | ||||
| CVE-2025-48606 | 1 Google | 1 Android | 2025-12-09 | 7.8 High |
| In preparePackage of InstallPackageHelper.java, there is a possible way for an app to appear hidden upon installation without a mechanism to uninstall it due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
| CVE-2025-13639 | 4 Apple, Google, Linux and 1 more | 4 Macos, Chrome, Linux Kernel and 1 more | 2025-12-08 | 8.1 High |
| Inappropriate implementation in WebRTC in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Low) | ||||
| CVE-2025-21022 | 1 Samsung | 1 Galaxy Wearable | 2025-12-08 | 3.3 Low |
| Improper access control in Galaxy Wearable prior to version 2.2.63.25042861 allows local attackers to access sensitive information. | ||||