| Tag |
CVE ID |
CVE Title |
Severity |
| .NET |
CVE-2025-55247 |
.NET Elevation of Privilege Vulnerability |
Essential |
| .NET, .NET Framework, Visible Studio |
CVE-2025-55248 |
.NET, .NET Framework, and Visible Studio Data Disclosure Vulnerability |
Essential |
| Lively Listing Federation Companies |
CVE-2025-59258 |
Home windows Lively Listing Federation Companies (ADFS) Data Disclosure Vulnerability |
Essential |
| Agere Home windows Modem Driver |
CVE-2025-24990 |
Home windows Agere Modem Driver Elevation of Privilege Vulnerability |
Essential |
| Agere Home windows Modem Driver |
CVE-2025-24052 |
Home windows Agere Modem Driver Elevation of Privilege Vulnerability |
Essential |
| AMD Restricted Reminiscence Web page |
CVE-2025-0033 |
AMD CVE-2025-0033: RMP Corruption Throughout SNP Initialization |
Vital |
| ASP.NET Core |
CVE-2025-55315 |
ASP.NET Safety Characteristic Bypass Vulnerability |
Essential |
| Azure Related Machine Agent |
CVE-2025-47989 |
Azure Related Machine Agent Elevation of Privilege Vulnerability |
Essential |
| Azure Related Machine Agent |
CVE-2025-58724 |
Arc Enabled Servers – Azure Related Machine Agent Elevation of Privilege Vulnerability |
Essential |
| Azure Entra ID |
CVE-2025-59218 |
Azure Entra ID Elevation of Privilege Vulnerability |
Vital |
| Azure Entra ID |
CVE-2025-59246 |
Azure Entra ID Elevation of Privilege Vulnerability |
Vital |
| Azure Native |
CVE-2025-55697 |
Azure Native Elevation of Privilege Vulnerability |
Essential |
| Azure Monitor |
CVE-2025-55321 |
Azure Monitor Log Analytics Spoofing Vulnerability |
Vital |
| Azure Monitor Agent |
CVE-2025-59285 |
Azure Monitor Agent Elevation of Privilege Vulnerability |
Essential |
| Azure Monitor Agent |
CVE-2025-59494 |
Azure Monitor Agent Elevation of Privilege Vulnerability |
Essential |
| Azure PlayFab |
CVE-2025-59247 |
Azure PlayFab Elevation of Privilege Vulnerability |
Vital |
| Confidential Azure Container Situations |
CVE-2025-59292 |
Azure Compute Gallery Elevation of Privilege Vulnerability |
Vital |
| Confidential Azure Container Situations |
CVE-2025-59291 |
Confidential Azure Container Situations Elevation of Privilege Vulnerability |
Vital |
| Related Gadgets Platform Service (Cdpsvc) |
CVE-2025-59191 |
Home windows Related Gadgets Platform Service Elevation of Privilege Vulnerability |
Essential |
| Related Gadgets Platform Service (Cdpsvc) |
CVE-2025-55326 |
Home windows Related Gadgets Platform Service (Cdpsvc) Distant Code Execution Vulnerability |
Essential |
| Related Gadgets Platform Service (Cdpsvc) |
CVE-2025-58719 |
Home windows Related Gadgets Platform Service Elevation of Privilege Vulnerability |
Essential |
| Copilot |
CVE-2025-59272 |
Copilot Spoofing Vulnerability |
Vital |
| Copilot |
CVE-2025-59252 |
M365 Copilot Spoofing Vulnerability |
Vital |
| Copilot |
CVE-2025-59286 |
Copilot Spoofing Vulnerability |
Vital |
| Data Sharing Service Consumer |
CVE-2025-59200 |
Data Sharing Service Spoofing Vulnerability |
Essential |
| Video games |
CVE-2025-59489 |
MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability |
Essential |
| GitHub |
CVE-2025-59288 |
Playwright Spoofing Vulnerability |
Reasonable |
| Inbox COM Objects |
CVE-2025-58735 |
Inbox COM Objects (World Reminiscence) Distant Code Execution Vulnerability |
Essential |
| Inbox COM Objects |
CVE-2025-58732 |
Inbox COM Objects (World Reminiscence) Distant Code Execution Vulnerability |
Essential |
| Inbox COM Objects |
CVE-2025-59282 |
Web Data Companies (IIS) Inbox COM Objects (World Reminiscence) Distant Code Execution Vulnerability |
Essential |
| Inbox COM Objects |
CVE-2025-58733 |
Inbox COM Objects (World Reminiscence) Distant Code Execution Vulnerability |
Essential |
| Inbox COM Objects |
CVE-2025-58734 |
Inbox COM Objects (World Reminiscence) Distant Code Execution Vulnerability |
Essential |
| Inbox COM Objects |
CVE-2025-58738 |
Inbox COM Objects (World Reminiscence) Distant Code Execution Vulnerability |
Essential |
| Inbox COM Objects |
CVE-2025-58731 |
Inbox COM Objects (World Reminiscence) Distant Code Execution Vulnerability |
Essential |
| Inbox COM Objects |
CVE-2025-58730 |
Inbox COM Objects (World Reminiscence) Distant Code Execution Vulnerability |
Essential |
| Inbox COM Objects |
CVE-2025-58736 |
Inbox COM Objects (World Reminiscence) Distant Code Execution Vulnerability |
Essential |
| Web Explorer |
CVE-2025-59295 |
Home windows URL Parsing Distant Code Execution Vulnerability |
Essential |
| JDBC Driver for SQL Server |
CVE-2025-59250 |
JDBC Driver for SQL Server Spoofing Vulnerability |
Essential |
| Mariner |
CVE-2025-39943 |
ksmbd: smbdirect: validate data_offset and data_length discipline of smb_direct_data_transfer |
Vital |
| Mariner |
CVE-2025-39946 |
tls: make certain to abort the stream if headers are bogus |
Reasonable |
| Mariner |
CVE-2025-39942 |
ksmbd: smbdirect: confirm remaining_data_length respects max_fragmented_recv_size |
Reasonable |
| Mariner |
CVE-2025-39951 |
um: virtio_uml: Repair use-after-free after put_device in probe |
Reasonable |
| Mariner |
CVE-2025-39932 |
smb: shopper: let smbd_destroy() name disable_work_sync(&info->post_send_credits_work) |
Reasonable |
| Mariner |
CVE-2025-39949 |
qed: Do not gather too many safety override GRC parts |
Reasonable |
| Mariner |
CVE-2025-39937 |
internet: rfkill: gpio: Repair crash on account of dereferencering uninitialized pointer |
Reasonable |
| Mariner |
CVE-2025-39955 |
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). |
Reasonable |
| Mariner |
CVE-2025-39895 |
sched: Repair sched_numa_find_nth_cpu() if masks offline |
Reasonable |
| Mariner |
CVE-2025-11413 |
GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds |
Reasonable |
| Mariner |
CVE-2025-11414 |
GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds |
Reasonable |
| Mariner |
CVE-2025-39938 |
ASoC: qcom: q6apm-lpass-dais: Repair NULL pointer dereference if supply graph failed |
Reasonable |
| Mariner |
CVE-2025-11495 |
GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow |
Reasonable |
| Mariner |
CVE-2025-39934 |
drm: bridge: anx7625: Repair NULL pointer dereference with early IRQ |
Reasonable |
| Mariner |
CVE-2025-39929 |
smb: shopper: repair smbdirect_recv_io leak in smbd_negotiate() error path |
Reasonable |
| Mariner |
CVE-2025-39945 |
cnic: Repair use-after-free bugs in cnic_delete_task |
Essential |
| Mariner |
CVE-2025-39907 |
mtd: rawnand: stm32_fmc2: keep away from overlapping mappings on ECC buffer |
Vital |
| Mariner |
CVE-2025-39913 |
tcp_bpf: Name sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. |
Reasonable |
| Mariner |
CVE-2025-39952 |
wifi: wilc1000: keep away from buffer overflow in WID string configuration |
Essential |
| Mariner |
CVE-2025-39940 |
dm-stripe: repair a potential integer overflow |
Reasonable |
| Mariner |
CVE-2025-39953 |
cgroup: break up cgroup_destroy_wq into 3 workqueues |
Reasonable |
| Mariner |
CVE-2023-53469 |
af_unix: Repair null-ptr-deref in unix_stream_sendpage(). |
Essential |
| Mariner |
CVE-2025-39914 |
tracing: Silence warning when chunk allocation fails in trace_pid_write |
Reasonable |
| Mariner |
CVE-2025-39905 |
internet: phylink: add lock for serializing concurrent pl->phydev writes with resolver |
Reasonable |
| Mariner |
CVE-2025-39920 |
pcmcia: Add error dealing with for add_interval() in do_validate_mem() |
Reasonable |
| Mariner |
CVE-2025-39911 |
i40e: repair IRQ liberating in i40e_vsi_request_irq_msix error path |
Low |
| Mariner |
CVE-2025-39958 |
iommu/s390: Make connect succeed when the system was shock eliminated |
Low |
| Mariner |
CVE-2025-8291 |
ZIP64 Finish of Central Listing (EOCD) Locator document offset not checked |
Reasonable |
| Mariner |
CVE-2025-39957 |
wifi: mac80211: improve scan_ies_len for S1G |
Low |
| Mariner |
CVE-2025-46818 |
Redis: Authenticated customers can execute LUA scripts as a distinct person |
Reasonable |
| Mariner |
CVE-2025-46817 |
Lua library instructions might result in integer overflow and potential RCE |
Essential |
| Mariner |
CVE-2022-50502 |
mm: /proc/pid/smaps_rollup: repair no vma’s null-deref |
Reasonable |
| Mariner |
CVE-2025-39944 |
octeontx2-pf: Repair use-after-free bugs in otx2_sync_tstamp() |
Essential |
| Mariner |
CVE-2025-11234 |
Qemu-kvm: vnc websocket handshake use-after-free |
Reasonable |
| Mariner |
CVE-2025-49844 |
Redis Lua Use-After-Free might result in distant code execution |
Vital |
| Mariner |
CVE-2025-10729 |
Use-after-free vulnerability in Qt SVG qsvghandler.cpp permits denial of service through crafted SVG |
Essential |
| Mariner |
CVE-2025-39961 |
iommu/amd/pgtbl: Repair potential race whereas improve web page desk degree |
Reasonable |
| Mariner |
CVE-2025-61984 |
ssh in OpenSSH earlier than 10.1 permits management characters in usernames that originate from sure presumably untrusted sources, doubtlessly resulting in code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence enlargement of a configuration file. (A configuration file that gives a whole literal username will not be categorized as an untrusted supply.) |
Low |
| Mariner |
CVE-2025-46819 |
Redis is susceptible to DoS through specifically crafted LUA scripts |
Reasonable |
| Mariner |
CVE-2025-37727 |
Elasticsearch Insertion of delicate info in log file |
Reasonable |
| Mariner |
CVE-2025-11412 |
GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds |
Reasonable |
| Mariner |
CVE-2025-39931 |
crypto: af_alg – Set merge to zero early in af_alg_sendmsg |
Reasonable |
| Mariner |
CVE-2025-39933 |
smb: shopper: let recv_done confirm data_offset, data_length and remaining_data_length |
Reasonable |
| Mariner |
CVE-2025-39947 |
internet/mlx5e: Harden uplink netdev entry in opposition to system unbind |
Reasonable |
| Mariner |
CVE-2025-61985 |
ssh in OpenSSH earlier than 10.1 permits the ‘ |