Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities323531
CVE-2025-62465
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.91%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DirectX Graphics Kernel Denial of Service Vulnerability

Null pointer dereference in Windows DirectX allows an authorized attacker to deny service locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_24h2windows_11_23h2windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 11 Version 23H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-62464
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.46%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Buffer over-read in Windows Projected File System allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2019Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-126
Buffer Over-read
CVE-2025-62463
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.91%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DirectX Graphics Kernel Denial of Service Vulnerability

Null pointer dereference in Windows DirectX allows an authorized attacker to deny service locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_11_23h2windows_10_21h2windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-62462
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.46%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Buffer over-read in Windows Projected File System allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2019Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-126
Buffer Over-read
CVE-2025-62461
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.46%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Projected File System Elevation of Privilege Vulnerability

Buffer over-read in Windows Projected File System Filter Driver allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2019Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-126
Buffer Over-read
CVE-2025-62455
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.90%
||
7 Day CHG-0.02%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

Improper input validation in Windows Message Queuing allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_server_2012windows_server_2008windows_server_2019windows_10_21h2windows_10_1809windows_server_2016Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows 10 Version 21H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2016Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)
CWE ID-CWE-20
Improper Input Validation
CVE-2025-59517
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.29%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Storage VSP Driver Elevation of Privilege Vulnerability

Improper access control in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_server_2022windows_10_21h2windows_10_1809windows_server_2016windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2019Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2022Windows Server 2025Windows Server 2016Windows 11 version 22H3Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows Server 2016 (Server Core installation)Windows 11 Version 24H2
CWE ID-CWE-284
Improper Access Control
CVE-2025-59516
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.31%
||
7 Day CHG-0.03%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Storage VSP Driver Elevation of Privilege Vulnerability

Missing authentication for critical function in Windows Storage VSP Driver allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2019Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-73
External Control of File Name or Path
CVE-2025-64673
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 14.10%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Storage VSP Driver Elevation of Privilege Vulnerability

Improper access control in Storvsp.sys Driver allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2019Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-284
Improper Access Control
CVE-2025-64670
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 34.16%
||
7 Day CHG-0.03%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows DirectX Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Microsoft Graphics Component allows an authorized attacker to disclose information over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_11_23h2windows_10_21h2windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-64666
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.84%
||
7 Day CHG-0.02%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Exchange Server Elevation of Privilege Vulnerability

Improper input validation in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-Microsoft Exchange Server 2019 Cumulative Update 15Microsoft Exchange Server 2016 Cumulative Update 23Microsoft Exchange Server Subscription Edition RTMMicrosoft Exchange Server 2019 Cumulative Update 14
CWE ID-CWE-20
Improper Input Validation
CVE-2025-64667
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 16.36%
||
7 Day CHG-0.00%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Exchange Server Spoofing Vulnerability

User interface (ui) misrepresentation of critical information in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-Microsoft Exchange Server 2019 Cumulative Update 15Microsoft Exchange Server 2016 Cumulative Update 23Microsoft Exchange Server Subscription Edition RTMMicrosoft Exchange Server 2019 Cumulative Update 14
CWE ID-CWE-451
User Interface (UI) Misrepresentation of Critical Information
CVE-2025-64658
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 12.04%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows File Explorer Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Shell allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2019Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2025-62573
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.04% / 12.38%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DirectX Graphics Kernel Elevation of Privilege Vulnerability

Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_server_2022windows_10_21h2windows_10_1809windows_server_2016windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2019Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2022Windows Server 2025Windows Server 2016Windows 11 version 22H3Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows Server 2016 (Server Core installation)Windows 11 Version 24H2
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE ID-CWE-416
Use After Free
CVE-2025-62572
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.46%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Application Information Service Elevation of Privilege Vulnerability

Out-of-bounds read in Application Information Services allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_24h2windows_server_2025windows_11_25h2Windows 11 Version 25H2Windows Server 2025Windows 11 Version 24H2Windows Server 2025 (Server Core installation)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-62571
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.90%
||
7 Day CHG-0.02%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Installer Elevation of Privilege Vulnerability

Improper input validation in Windows Installer allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_server_2012windows_11_24h2windows_server_2008windows_server_2019windows_11_23h2windows_server_2022windows_10_21h2windows_10_1809windows_server_2016windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2022Windows Server 2025Windows Server 2016Windows Server 2008 Service Pack 2 (Server Core installation)Windows 11 version 22H3Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows 11 Version 25H2Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows 11 Version 24H2
CWE ID-CWE-20
Improper Input Validation
CVE-2025-62564
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.57%
||
7 Day CHG-0.02%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Excel Remote Code Execution Vulnerability

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-officeexceloffice_long_term_servicing_channel365_appsoffice_online_serverMicrosoft Office LTSC 2024Microsoft Office LTSC for Mac 2021Microsoft Office LTSC 2021Microsoft Office LTSC for Mac 2024Microsoft 365 Apps for EnterpriseMicrosoft Office 2019Microsoft Excel 2016Office Online Server
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-62563
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.57%
||
7 Day CHG-0.02%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Excel Remote Code Execution Vulnerability

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-officeexceloffice_long_term_servicing_channel365_appsoffice_online_serverMicrosoft Office LTSC 2024Microsoft Office LTSC for Mac 2021Microsoft Office LTSC 2021Microsoft Office LTSC for Mac 2024Microsoft 365 Apps for EnterpriseMicrosoft Office 2019Microsoft Excel 2016Office Online Server
CWE ID-CWE-416
Use After Free
CVE-2025-62562
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.57%
||
7 Day CHG-0.04%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Outlook Remote Code Execution Vulnerability

Use after free in Microsoft Office Outlook allows an unauthorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-office365_appsoffice_long_term_servicing_channelsharepoint_serverwordMicrosoft Word 2016Microsoft Office LTSC for Mac 2021Microsoft Office LTSC 2021Microsoft SharePoint Enterprise Server 2016Microsoft Office LTSC for Mac 2024Microsoft 365 Apps for EnterpriseMicrosoft Office 2019Microsoft SharePoint Server 2019Microsoft Office LTSC 2024
CWE ID-CWE-416
Use After Free
CVE-2025-62561
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.57%
||
7 Day CHG-0.02%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Excel Remote Code Execution Vulnerability

Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-exceloffice_long_term_servicing_channelofficeoffice_online_server365_appsMicrosoft Office LTSC 2024Microsoft Office LTSC for Mac 2021Microsoft Office LTSC 2021Microsoft Office LTSC for Mac 2024Microsoft 365 Apps for EnterpriseMicrosoft Office 2019Microsoft Excel 2016Office Online Server
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2025-62549
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-0.07% / 20.48%
||
7 Day CHG-0.02%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_server_2012windows_11_24h2windows_server_2008windows_server_2019windows_11_23h2windows_server_2022windows_10_21h2windows_10_1809windows_server_2016windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2022Windows Server 2025Windows Server 2016Windows Server 2008 Service Pack 2 (Server Core installation)Windows 11 version 22H3Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows 11 Version 25H2Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows 11 Version 24H2
CWE ID-CWE-822
Untrusted Pointer Dereference
CVE-2025-62473
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 18.45%
||
7 Day CHG-0.02%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_server_2012windows_11_24h2windows_server_2008windows_server_2019windows_11_23h2windows_server_2022windows_10_21h2windows_10_1809windows_server_2016windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2022Windows Server 2025Windows Server 2016Windows Server 2008 Service Pack 2 (Server Core installation)Windows 11 version 22H3Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows 11 Version 25H2Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows 11 Version 24H2
CWE ID-CWE-126
Buffer Over-read
CVE-2025-62472
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.04%
||
7 Day CHG-0.08%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

Use of uninitialized resource in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_server_2012windows_11_24h2windows_server_2008windows_server_2019windows_11_23h2windows_server_2022windows_10_21h2windows_10_1809windows_server_2016windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2022Windows Server 2025Windows Server 2016Windows Server 2008 Service Pack 2 (Server Core installation)Windows 11 version 22H3Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows 11 Version 25H2Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows 11 Version 24H2
CWE ID-CWE-416
Use After Free
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2025-62470
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.46%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Common Log File System Driver Elevation of Privilege Vulnerability

Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_server_2012windows_11_24h2windows_server_2008windows_server_2019windows_11_23h2windows_server_2022windows_10_21h2windows_10_1809windows_server_2016windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2022Windows Server 2025Windows Server 2016Windows Server 2008 Service Pack 2 (Server Core installation)Windows 11 version 22H3Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows 11 Version 25H2Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows 11 Version 24H2
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2025-62469
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7||HIGH
EPSS-0.04% / 12.38%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Brokering File System Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_24h2windows_server_2025windows_11_25h2Windows 11 Version 25H2Windows Server 2025Windows 11 Version 24H2Windows Server 2025 (Server Core installation)
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE ID-CWE-415
Double Free
CVE-2025-62466
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.46%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Client-Side Caching Elevation of Privilege Vulnerability

Null pointer dereference in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_server_2012windows_11_24h2windows_server_2008windows_server_2019windows_11_23h2windows_server_2022windows_10_21h2windows_10_1809windows_server_2016windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2022Windows Server 2025Windows Server 2016Windows Server 2008 Service Pack 2 (Server Core installation)Windows 11 version 22H3Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows 11 Version 25H2Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows 11 Version 24H2
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-62458
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.46%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Win32k Elevation of Privilege Vulnerability

Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_1607windows_10_22h2windows_server_2012windows_server_2008windows_server_2019windows_11_23h2windows_server_2022windows_10_21h2windows_10_1809windows_server_2016Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows 10 Version 1607Windows Server 2022Windows Server 2016Windows 11 version 22H3Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2008 R2 Service Pack 1Windows Server 2016 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2025-62457
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.46%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Out-of-bounds read in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2019Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-62456
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-0.08% / 23.47%
||
7 Day CHG-0.02%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability

Heap-based buffer overflow in Windows Resilient File System (ReFS) allows an authorized attacker to execute code over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_24h2windows_11_23h2windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 11 Version 23H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2025-62454
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.80%
||
7 Day CHG-0.01%
Published-09 Dec, 2025 | 17:55
Updated-19 Dec, 2025 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Heap-based buffer overflow in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_11_24h2windows_server_2019windows_11_23h2windows_10_21h2windows_10_1809windows_server_2022windows_server_2025windows_server_2022_23h2windows_11_25h2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2019Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows 10 Version 21H2Windows 11 Version 23H2Windows 10 Version 22H2Windows Server 2022Windows Server 2025Windows 11 Version 24H2Windows 11 version 22H3
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2025-33214
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-8.8||HIGH
EPSS-0.06% / 19.81%
||
7 Day CHG+0.02%
Published-09 Dec, 2025 | 17:49
Updated-09 Dec, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA NVTabular for Linux contains a vulnerability in the Workflow component, where a user could cause a deserialization issue. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NVTabular
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-33213
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-8.8||HIGH
EPSS-0.06% / 19.81%
||
7 Day CHG+0.02%
Published-09 Dec, 2025 | 17:48
Updated-09 Dec, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Merlin Transformers4Rec for Linux contains a vulnerability in the Trainer component, where a user could cause a deserialization issue. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-Merlin Transformers4Rec
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-64784
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-7.1||HIGH
EPSS-0.02% / 5.75%
||
7 Day CHG+0.01%
Published-09 Dec, 2025 | 17:41
Updated-10 Dec, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNG SDK | Heap-based Buffer Overflow (CWE-122)

DNG SDK versions 1.7.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to memory exposure or application denial of service. An attacker could leverage this vulnerability to disclose sensitive memory information. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Microsoft CorporationAdobe Inc.Apple Inc.
Product-windowsdng_software_development_kitmacosDNG SDK
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2025-64894
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.37%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:41
Updated-10 Dec, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNG SDK | Integer Overflow or Wraparound (CWE-190)

DNG SDK versions 1.7.0 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could lead to application denial-of-service. An attacker could exploit this issue to cause the application to crash or become unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Microsoft CorporationAdobe Inc.Apple Inc.
Product-windowsdng_software_development_kitmacosDNG SDK
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-64893
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-7.1||HIGH
EPSS-0.02% / 5.75%
||
7 Day CHG+0.01%
Published-09 Dec, 2025 | 17:41
Updated-10 Dec, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNG SDK | Out-of-bounds Read (CWE-125)

DNG SDK versions 1.7.0 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure or application denial of service. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Microsoft CorporationAdobe Inc.Apple Inc.
Product-windowsdng_software_development_kitmacosDNG SDK
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-64783
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.88%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:41
Updated-10 Dec, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DNG SDK | Integer Overflow or Wraparound (CWE-190)

DNG SDK versions 1.7.0 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Microsoft CorporationAdobe Inc.Apple Inc.
Product-windowsdng_software_development_kitmacosDNG SDK
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-46636
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-6.6||MEDIUM
EPSS-0.01% / 0.47%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:34
Updated-10 Dec, 2025 | 17:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Encryption, versions prior to 11.12.1, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering.

Action-Not Available
Vendor-Dell Inc.
Product-encryptionDell Encryption
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2025-46637
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-7.3||HIGH
EPSS-0.01% / 0.54%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:31
Updated-10 Dec, 2025 | 17:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Encryption, versions prior to 11.12.1, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A local malicious user could potentially exploit this vulnerability, leading to Elevation of privileges.

Action-Not Available
Vendor-Dell Inc.
Product-encryptionDell Encryption
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2025-13924
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 1.43%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:23
Updated-09 Dec, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Advanced Product Fields (Product Addons) for WooCommerce <= 1.6.17 - Cross-Site Request Forgery to Product Field Group Duplication and Publication

The Advanced Product Fields (Product Addons) for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.17. This is due to missing or incorrect nonce validation on the 'maybe_duplicate' function. This makes it possible for unauthenticated attackers to duplicate and publish product field groups, including draft and pending field groups, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Action-Not Available
Vendor-maartenbelmans
Product-Advanced Product Fields (Product Addons) for WooCommerce
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-47570
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.06% / 18.43%
||
7 Day CHG+0.01%
Published-09 Dec, 2025 | 17:20
Updated-10 Dec, 2025 | 20:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0 all versions; FortiProxy 7.4.0 through 7.4.3, 7.2.0 through 7.2.11; FortiPAM 1.4 all versions, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions and FortiSRA 1.4 all versions may allow a read-only administrator to retrieve API tokens of other administrators via observing REST API logs, if REST API logging is enabled (non-default configuration).

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisrafortiosfortisasefortiproxyfortipamFortiOSFortiSASEFortiPAMFortiSRAFortiProxy
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2025-59718
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-9.1||CRITICAL
EPSS-5.57% / 89.97%
||
7 Day CHG+5.48%
Published-09 Dec, 2025 | 17:20
Updated-17 Dec, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-12-23||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosfortiswitchmanagerfortiproxyFortiSwitchManagerFortiProxyFortiOSMultiple Products
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-59719
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.07% / 21.96%
||
7 Day CHG-0.02%
Published-09 Dec, 2025 | 17:20
Updated-10 Dec, 2025 | 04:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiwebFortiWeb
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-53679
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.24% / 46.74%
||
7 Day CHG+0.07%
Published-09 Dec, 2025 | 17:19
Updated-10 Dec, 2025 | 04:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSandbox version 5.0.0 through 5.0.2 and before 4.4.7 GUI allows a remote privileged attacker to execute unauthorized code or commands via crafted HTTP or HTTPS requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisandbox_fortisandbox_paasFortiSandbox CloudFortiSandbox
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-54353
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 17.62%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:19
Updated-09 Dec, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.2, FortiSandbox 4.4.0 through 4.4.7, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions may allow an attacker to perform an XSS attack via crafted HTTP requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisandboxFortiSandbox
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-53949
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-7||HIGH
EPSS-0.08% / 23.95%
||
7 Day CHG+0.01%
Published-09 Dec, 2025 | 17:19
Updated-10 Dec, 2025 | 04:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.2, FortiSandbox 4.4.0 through 4.4.7, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisandboxFortiSandbox
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-59810
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.05% / 14.41%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:19
Updated-09 Dec, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper access control vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.1, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow information disclosure to an authenticated attacker via crafted requests

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisoarFortiSOAR on-premiseFortiSOAR PaaS
CWE ID-CWE-284
Improper Access Control
CVE-2025-59808
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 14.38%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:19
Updated-09 Dec, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unverified password change vulnerability [CWE-620] vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.1, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an attacker who has already gained access to a victim's user account to reset the account credentials without being prompted for the account's password

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisoarFortiSOAR on-premiseFortiSOAR PaaS
CWE ID-CWE-620
Unverified Password Change
CVE-2025-54838
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 4.93%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 17:18
Updated-09 Dec, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Incorrect Authorization vulnerability [CWE-863] in FortiPortal 7.4.0 through 7.4.5 may allow an authenticated attacker to reboot a shared FortiGate device via crafted HTTP requests.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiportalFortiPortal
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-62631
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 16.97%
||
7 Day CHG+0.01%
Published-09 Dec, 2025 | 17:18
Updated-09 Dec, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insufficient session expiration vulnerability [CWE-613] in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosFortiOS
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2025-57823
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-2.6||LOW
EPSS-0.03% / 7.45%
||
7 Day CHG+0.01%
Published-09 Dec, 2025 | 17:18
Updated-09 Dec, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A direct request ('forced browsing') vulnerability in Fortinet FortiAuthenticator 6.6.0 through 6.6.6, FortiAuthenticator 6.5 all versions, FortiAuthenticator 6.4 all versions, FortiAuthenticator 6.3 all versions may allow an authenticated attacker with at least sponsor permissions to read and download device logs via accessing specific endpoints

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiauthenticatorFortiAuthenticator
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2025-64153
Assigner-Fortinet, Inc.
ShareView Details
Assigner-Fortinet, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.16% / 37.31%
||
7 Day CHG+0.05%
Published-09 Dec, 2025 | 17:18
Updated-09 Dec, 2025 | 21:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiExtender 7.6.0 through 7.6.3, FortiExtender 7.4.0 through 7.4.7, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated attacker to execute unauthorized code or commands via a specific HTTP request.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiextenderfortiextender_firmwareFortiExtender
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Previous
  • 1
  • 2
  • ...
  • 44
  • 45
  • 46
  • ...
  • 6470
  • 6471
  • Next