| Tag |
CVE ID |
CVE Title |
Severity |
| .NET |
CVE-2025-55247 |
.NET Elevation of Privilege Vulnerability |
Important |
| .NET, .NET Framework, Visual Studio |
CVE-2025-55248 |
.NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability |
Important |
| Active Directory Federation Services |
CVE-2025-59258 |
Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability |
Important |
| Agere Windows Modem Driver |
CVE-2025-24990 |
Windows Agere Modem Driver Elevation of Privilege Vulnerability |
Important |
| Agere Windows Modem Driver |
CVE-2025-24052 |
Windows Agere Modem Driver Elevation of Privilege Vulnerability |
Important |
| AMD Restricted Memory Page |
CVE-2025-0033 |
AMD CVE-2025-0033: RMP Corruption During SNP Initialization |
Critical |
| ASP.NET Core |
CVE-2025-55315 |
ASP.NET Security Feature Bypass Vulnerability |
Important |
| Azure Connected Machine Agent |
CVE-2025-47989 |
Azure Connected Machine Agent Elevation of Privilege Vulnerability |
Important |
| Azure Connected Machine Agent |
CVE-2025-58724 |
Arc Enabled Servers – Azure Connected Machine Agent Elevation of Privilege Vulnerability |
Important |
| Azure Entra ID |
CVE-2025-59218 |
Azure Entra ID Elevation of Privilege Vulnerability |
Critical |
| Azure Entra ID |
CVE-2025-59246 |
Azure Entra ID Elevation of Privilege Vulnerability |
Critical |
| Azure Local |
CVE-2025-55697 |
Azure Local Elevation of Privilege Vulnerability |
Important |
| Azure Monitor |
CVE-2025-55321 |
Azure Monitor Log Analytics Spoofing Vulnerability |
Critical |
| Azure Monitor Agent |
CVE-2025-59285 |
Azure Monitor Agent Elevation of Privilege Vulnerability |
Important |
| Azure Monitor Agent |
CVE-2025-59494 |
Azure Monitor Agent Elevation of Privilege Vulnerability |
Important |
| Azure PlayFab |
CVE-2025-59247 |
Azure PlayFab Elevation of Privilege Vulnerability |
Critical |
| Confidential Azure Container Instances |
CVE-2025-59292 |
Azure Compute Gallery Elevation of Privilege Vulnerability |
Critical |
| Confidential Azure Container Instances |
CVE-2025-59291 |
Confidential Azure Container Instances Elevation of Privilege Vulnerability |
Critical |
| Connected Devices Platform Service (Cdpsvc) |
CVE-2025-59191 |
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability |
Important |
| Connected Devices Platform Service (Cdpsvc) |
CVE-2025-55326 |
Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability |
Important |
| Connected Devices Platform Service (Cdpsvc) |
CVE-2025-58719 |
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability |
Important |
| Copilot |
CVE-2025-59272 |
Copilot Spoofing Vulnerability |
Critical |
| Copilot |
CVE-2025-59252 |
M365 Copilot Spoofing Vulnerability |
Critical |
| Copilot |
CVE-2025-59286 |
Copilot Spoofing Vulnerability |
Critical |
| Data Sharing Service Client |
CVE-2025-59200 |
Data Sharing Service Spoofing Vulnerability |
Important |
| Games |
CVE-2025-59489 |
MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability |
Important |
| GitHub |
CVE-2025-59288 |
Playwright Spoofing Vulnerability |
Moderate |
| Inbox COM Objects |
CVE-2025-58735 |
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Important |
| Inbox COM Objects |
CVE-2025-58732 |
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Important |
| Inbox COM Objects |
CVE-2025-59282 |
Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Important |
| Inbox COM Objects |
CVE-2025-58733 |
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Important |
| Inbox COM Objects |
CVE-2025-58734 |
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Important |
| Inbox COM Objects |
CVE-2025-58738 |
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Important |
| Inbox COM Objects |
CVE-2025-58731 |
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Important |
| Inbox COM Objects |
CVE-2025-58730 |
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Important |
| Inbox COM Objects |
CVE-2025-58736 |
Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Important |
| Internet Explorer |
CVE-2025-59295 |
Windows URL Parsing Remote Code Execution Vulnerability |
Important |
| JDBC Driver for SQL Server |
CVE-2025-59250 |
JDBC Driver for SQL Server Spoofing Vulnerability |
Important |
| Mariner |
CVE-2025-39943 |
ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer |
Critical |
| Mariner |
CVE-2025-39946 |
tls: make sure to abort the stream if headers are bogus |
Moderate |
| Mariner |
CVE-2025-39942 |
ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size |
Moderate |
| Mariner |
CVE-2025-39951 |
um: virtio_uml: Fix use-after-free after put_device in probe |
Moderate |
| Mariner |
CVE-2025-39932 |
smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) |
Moderate |
| Mariner |
CVE-2025-39949 |
qed: Don’t collect too many protection override GRC elements |
Moderate |
| Mariner |
CVE-2025-39937 |
net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer |
Moderate |
| Mariner |
CVE-2025-39955 |
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). |
Moderate |
| Mariner |
CVE-2025-39895 |
sched: Fix sched_numa_find_nth_cpu() if mask offline |
Moderate |
| Mariner |
CVE-2025-11413 |
GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds |
Moderate |
| Mariner |
CVE-2025-11414 |
GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds |
Moderate |
| Mariner |
CVE-2025-39938 |
ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed |
Moderate |
| Mariner |
CVE-2025-11495 |
GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow |
Moderate |
| Mariner |
CVE-2025-39934 |
drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ |
Moderate |
| Mariner |
CVE-2025-39929 |
smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path |
Moderate |
| Mariner |
CVE-2025-39945 |
cnic: Fix use-after-free bugs in cnic_delete_task |
Important |
| Mariner |
CVE-2025-39907 |
mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer |
Critical |
| Mariner |
CVE-2025-39913 |
tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. |
Moderate |
| Mariner |
CVE-2025-39952 |
wifi: wilc1000: avoid buffer overflow in WID string configuration |
Important |
| Mariner |
CVE-2025-39940 |
dm-stripe: fix a possible integer overflow |
Moderate |
| Mariner |
CVE-2025-39953 |
cgroup: split cgroup_destroy_wq into 3 workqueues |
Moderate |
| Mariner |
CVE-2023-53469 |
af_unix: Fix null-ptr-deref in unix_stream_sendpage(). |
Important |
| Mariner |
CVE-2025-39914 |
tracing: Silence warning when chunk allocation fails in trace_pid_write |
Moderate |
| Mariner |
CVE-2025-39905 |
net: phylink: add lock for serializing concurrent pl->phydev writes with resolver |
Moderate |
| Mariner |
CVE-2025-39920 |
pcmcia: Add error handling for add_interval() in do_validate_mem() |
Moderate |
| Mariner |
CVE-2025-39911 |
i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path |
Low |
| Mariner |
CVE-2025-39958 |
iommu/s390: Make attach succeed when the device was surprise removed |
Low |
| Mariner |
CVE-2025-8291 |
ZIP64 End of Central Directory (EOCD) Locator record offset not checked |
Moderate |
| Mariner |
CVE-2025-39957 |
wifi: mac80211: increase scan_ies_len for S1G |
Low |
| Mariner |
CVE-2025-46818 |
Redis: Authenticated users can execute LUA scripts as a different user |
Moderate |
| Mariner |
CVE-2025-46817 |
Lua library commands may lead to integer overflow and potential RCE |
Important |
| Mariner |
CVE-2022-50502 |
mm: /proc/pid/smaps_rollup: fix no vma’s null-deref |
Moderate |
| Mariner |
CVE-2025-39944 |
octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() |
Important |
| Mariner |
CVE-2025-11234 |
Qemu-kvm: vnc websocket handshake use-after-free |
Moderate |
| Mariner |
CVE-2025-49844 |
Redis Lua Use-After-Free may lead to remote code execution |
Critical |
| Mariner |
CVE-2025-10729 |
Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG |
Important |
| Mariner |
CVE-2025-39961 |
iommu/amd/pgtbl: Fix possible race while increase page table level |
Moderate |
| Mariner |
CVE-2025-61984 |
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.) |
Low |
| Mariner |
CVE-2025-46819 |
Redis is vulnerable to DoS via specially crafted LUA scripts |
Moderate |
| Mariner |
CVE-2025-37727 |
Elasticsearch Insertion of sensitive information in log file |
Moderate |
| Mariner |
CVE-2025-11412 |
GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds |
Moderate |
| Mariner |
CVE-2025-39931 |
crypto: af_alg – Set merge to zero early in af_alg_sendmsg |
Moderate |
| Mariner |
CVE-2025-39933 |
smb: client: let recv_done verify data_offset, data_length and remaining_data_length |
Moderate |
| Mariner |
CVE-2025-39947 |
net/mlx5e: Harden uplink netdev access against device unbind |
Moderate |
| Mariner |
CVE-2025-61985 |
ssh in OpenSSH before 10.1 allows the ‘ |