Filtered by vendor Microsoft Subscriptions
Filtered by product Windows Subscriptions
Total 8365 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-50159 1 Microsoft 19 Windows, Windows 10, Windows 10 1507 and 16 more 2025-08-15 7.3 High
Use after free in Remote Access Point-to-Point Protocol (PPP) EAP-TLS allows an authorized attacker to elevate privileges locally.
CVE-2025-50158 1 Microsoft 19 Windows, Windows 10 1507, Windows 10 1607 and 16 more 2025-08-15 7 High
Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally.
CVE-2025-50156 1 Microsoft 13 Server, Windows, Windows 2008 and 10 more 2025-08-15 5.7 Medium
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.
CVE-2025-50154 1 Microsoft 19 Windows, Windows 10 1507, Windows 10 1607 and 16 more 2025-08-15 7.5 High
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-50153 1 Microsoft 19 Server, Windows, Windows 10 and 16 more 2025-08-15 7.8 High
Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally.
CVE-2025-49762 1 Microsoft 14 Windows, Windows 10, Windows 10 1507 and 11 more 2025-08-15 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2025-49761 1 Microsoft 14 Server, Windows, Windows 10 1507 and 11 more 2025-08-15 7.8 High
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2025-49757 1 Microsoft 10 Server, Windows, Windows 2008 and 7 more 2025-08-15 8.8 High
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
CVE-2025-49743 1 Microsoft 21 Windows, Windows 10, Windows 10 1507 and 18 more 2025-08-15 6.7 Medium
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
CVE-2025-49751 1 Microsoft 19 Hyper-v, Server, Windows and 16 more 2025-08-15 6.8 Medium
Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.
CVE-2021-34976 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2025-08-15 5.5 Medium
Foxit PDF Reader PDF File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14659.
CVE-2022-39163 2 Ibm, Microsoft 3 Cognos Controller, Controller, Windows 2025-08-15 4.7 Medium
IBM Cognos Controller 11.0.0 through 11.1.0 is vulnerable to a Client-Side Desync (CSD) attack where an attacker could exploit a desynchronized browser connection that could lead to further cross-site scripting (XSS) attacks.
CVE-2022-43850 3 Ibm, Linux, Microsoft 3 Aspera Console, Linux Kernel, Windows 2025-08-15 5.4 Medium
IBM Aspera Console 3.4.0 through 3.4.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVE-2022-43847 3 Ibm, Linux, Microsoft 3 Aspera Console, Linux Kernel, Windows 2025-08-15 5.4 Medium
IBM Aspera Console 3.4.0 through 3.4.4 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.
CVE-2022-43851 3 Ibm, Linux, Microsoft 3 Aspera Console, Linux Kernel, Windows 2025-08-15 5.9 Medium
IBM Aspera Console 3.4.0 through 3.4.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
CVE-2022-43852 3 Ibm, Linux, Microsoft 3 Aspera Console, Linux Kernel, Windows 2025-08-15 5.3 Medium
IBM Aspera Console 3.4.0 through 3.4.4 could disclose sensitive information in HTTP headers that could be used in further attacks against the system.
CVE-2022-29376 2 Apachefriends, Microsoft 2 Xampp, Windows 2025-08-15 8.8 High
Xampp for Windows v8.1.4 and below was discovered to contain insecure permissions for its install directory, allowing attackers to execute arbitrary code via overwriting binaries located in the directory.
CVE-2024-49355 3 Ibm, Linux, Microsoft 3 Openpages With Watson, Linux Kernel, Windows 2025-08-15 5.3 Medium
IBM OpenPages with Watson 8.3 and 9.0 may write improperly neutralized data to server log files when the tracing is enabled per the System Tracing feature.
CVE-2024-49779 3 Ibm, Linux, Microsoft 3 Openpages With Watson, Linux Kernel, Windows 2025-08-15 4.3 Medium
IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages could allow a remote attacker to bypass security restrictions, caused by improper validation and management of authentication cookies. By modifying the CSRF token and Session Id cookie parameters using the cookies of another user, a remote attacker could exploit this vulnerability to bypass security restrictions and gain unauthorized access to the vulnerable application.
CVE-2024-49780 3 Ibm, Linux, Microsoft 3 Openpages With Watson, Linux Kernel, Windows 2025-08-15 5.3 Medium
IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages could allow a remote attacker to traverse directories on the system. An attacker with privileges to perform Import Configuration could send a specially crafted http request containing "dot dot" sequences (/../) in the file name parameter used in Import Configuration to write files to arbitrary locations outside of the specified directory and possibly overwrite arbitrary files.