Last Full Sync: Fri Jan 16 2026 23:46:49 GMT+0000 (Coordinated Universal Time)

Number of records found: 7645

PLEASE NARROW YOUR SEARCH
50 PREVIEW RECORDS SHOWN



CAUTION: INCOMPLETE DATA SHOWN - PLEASE REFINE FILTER



No basescore filter!

1. ID: CVE-2026-21280

Assigner: psirt@adobe.com

Description: Illustrator versions 29.8.3, 30.0 and earlier are affected by an Untrusted Search Path vulnerability that could result in arbitrary code execution in the context of the current user. If the application uses a search path to locate critical resources such as programs, an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.

Published Date: Tue Jan 13 2026 19:16:25 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 19:28:23 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 19:29:14 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.6

Base Severity: HIGH

LAST MODIFIED: 22 days ago

2. ID: CVE-2026-21267

Assigner: psirt@adobe.com

Description: Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.

Published Date: Tue Jan 13 2026 19:16:24 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 20:51:15 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 20:52:39 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.6

Base Severity: HIGH

LAST MODIFIED: 22 days ago

3. ID: CVE-2026-21268

Assigner: psirt@adobe.com

Description: Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.

Published Date: Tue Jan 13 2026 19:16:24 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 20:50:52 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 20:52:39 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.6

Base Severity: HIGH

LAST MODIFIED: 22 days ago

4. ID: CVE-2026-21271

Assigner: psirt@adobe.com

Description: Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.

Published Date: Tue Jan 13 2026 19:16:24 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 20:50:28 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 20:51:17 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.6

Base Severity: HIGH

LAST MODIFIED: 22 days ago

5. ID: CVE-2026-21272

Assigner: psirt@adobe.com

Description: Dreamweaver Desktop versions 21.6 and earlier are affected by an Improper Input Validation vulnerability that could lead to arbitrary file system write. An attacker could leverage this vulnerability to manipulate or inject malicious data into files on the system. Exploitation of this issue requires user interaction in that a victim must open a malicious file and scope is changed.

Published Date: Tue Jan 13 2026 19:16:24 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 20:49:33 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 20:51:17 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.6

Base Severity: HIGH

LAST MODIFIED: 22 days ago

6. ID: CVE-2026-20963

Assigner: secure@microsoft.com

Description: Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Published Date: Tue Jan 13 2026 18:16:24 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 19:17:24 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 19:22:25 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: LOW

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 22 days ago

7. ID: CVE-2026-20953

Assigner: secure@microsoft.com

Description: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Published Date: Tue Jan 13 2026 18:16:23 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 19:56:25 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 19:58:48 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.4

Base Severity: HIGH

LAST MODIFIED: 22 days ago

8. ID: CVE-2026-20952

Assigner: secure@microsoft.com

Description: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Published Date: Tue Jan 13 2026 18:16:22 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 19:55:31 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 19:56:42 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.4

Base Severity: HIGH

LAST MODIFIED: 22 days ago

9. ID: CVE-2026-20947

Assigner: secure@microsoft.com

Description: Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Published Date: Tue Jan 13 2026 18:16:22 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Jan 16 2026 16:17:12 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Jan 16 2026 23:38:34 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 4 days

Privileges Required: LOW

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 20 days ago

10. ID: CVE-2026-20944

Assigner: secure@microsoft.com

Description: Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Published Date: Tue Jan 13 2026 18:16:21 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Jan 16 2026 16:15:25 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Jan 16 2026 23:38:34 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 4 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.4

Base Severity: HIGH

LAST MODIFIED: 20 days ago

11. ID: CVE-2026-20931

Assigner: secure@microsoft.com

Description: External control of file name or path in Windows Telephony Service allows an authorized attacker to elevate privileges over an adjacent network.

Published Date: Tue Jan 13 2026 18:16:20 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Jan 16 2026 15:06:39 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Jan 16 2026 23:38:34 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 4 days

Privileges Required: LOW

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8

Base Severity: HIGH

LAST MODIFIED: 20 days ago

12. ID: CVE-2026-20868

Assigner: secure@microsoft.com

Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

Published Date: Tue Jan 13 2026 18:16:16 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Thu Jan 15 2026 15:45:10 GMT+0000 (Coordinated Universal Time)

Intake Date: Thu Jan 15 2026 16:04:49 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 21 days ago

13. ID: CVE-2026-20856

Assigner: secure@microsoft.com

Description: Improper input validation in Windows Server Update Service allows an unauthorized attacker to execute code over a network.

Published Date: Tue Jan 13 2026 18:16:14 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Thu Jan 15 2026 15:20:22 GMT+0000 (Coordinated Universal Time)

Intake Date: Thu Jan 15 2026 15:30:27 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.1

Base Severity: HIGH

LAST MODIFIED: 21 days ago

14. ID: CVE-2025-64155

Assigner: psirt@fortinet.com

Description: An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.

Published Date: Tue Jan 13 2026 17:15:58 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 21:37:40 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 21:40:02 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 9.8

Base Severity: CRITICAL

LAST MODIFIED: 21 days ago

15. ID: CVE-2025-25249

Assigner: psirt@fortinet.com

Description: A heap-based buffer overflow vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiOS 6.4.0 through 6.4.16, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows attacker to execute unauthorized code or commands via specially crafted packets

Published Date: Tue Jan 13 2026 17:15:56 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Jan 16 2026 09:16:01 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 21:34:07 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.1

Base Severity: HIGH

LAST MODIFIED: 20 days ago

16. ID: CVE-2025-69274

Assigner: vuln@ca.com

Description: Authorization Bypass Through User-Controlled Key vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Privilege Escalation.This issue affects DX NetOps Spectrum: 24.3.10 and earlier.

Published Date: Mon Jan 12 2026 05:16:11 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 16:48:55 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 17:20:28 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: LOW

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 22 days ago

17. ID: CVE-2025-69276

Assigner: vuln@ca.com

Description: Deserialization of Untrusted Data vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Object Injection.This issue affects DX NetOps Spectrum: 24.3.13 and earlier.

Published Date: Mon Jan 12 2026 05:16:11 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 16:41:50 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 16:45:47 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: LOW

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 22 days ago

18. ID: CVE-2025-69269

Assigner: vuln@ca.com

Description: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows OS Command Injection.This issue affects DX NetOps Spectrum: 23.3.6 and earlier.

Published Date: Mon Jan 12 2026 05:16:10 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 18:01:20 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 18:08:35 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 9.8

Base Severity: CRITICAL

LAST MODIFIED: 22 days ago

19. ID: CVE-2025-69270

Assigner: vuln@ca.com

Description: Information Exposure Through Query Strings in GET Request vulnerability in Broadcom DX NetOps Spectrum on Windows, Linux allows Session Hijacking.This issue affects DX NetOps Spectrum: 24.3.8 and earlier.

Published Date: Mon Jan 12 2026 05:16:10 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 17:56:04 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 18:08:35 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 9.8

Base Severity: CRITICAL

LAST MODIFIED: 22 days ago

20. ID: CVE-2025-69258

Assigner: security@trendmicro.com

Description: A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations.

Published Date: Thu Jan 08 2026 13:15:42 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Thu Jan 15 2026 19:18:37 GMT+0000 (Coordinated Universal Time)

Intake Date: Thu Jan 15 2026 19:20:15 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 8 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 9.8

Base Severity: CRITICAL

LAST MODIFIED: 21 days ago

21. ID: CVE-2024-58315

Assigner: disclosure@vulncheck.com

Description: Tosibox Key Service 3.3.0 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the service startup process by inserting malicious code in the system root path, enabling unauthorized code execution during application startup or system reboot.

Published Date: Tue Dec 30 2025 23:15:48 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Jan 16 2026 19:16:15 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Jan 09 2026 22:05:30 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 10 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.4

Base Severity: HIGH

LAST MODIFIED: 20 days ago

22. ID: CVE-2025-13941

Assigner: 14984358-7092-470d-8f34-ade47a7658a2

Description: A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor Update Service. During plugin installation, incorrect file system permissions are assigned to resources used by the update service. A local attacker with low privileges could modify or replace these resources, which are later executed by the service, resulting in execution of arbitrary code with SYSTEM privileges.

Published Date: Fri Dec 19 2025 02:16:04 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Tue Dec 23 2025 17:35:55 GMT+0000 (Coordinated Universal Time)

Intake Date: Tue Dec 23 2025 17:38:17 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 5 days

Privileges Required: LOW

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 44 days ago

23. ID: CVE-2025-64675

Assigner: secure@microsoft.com

Description: Improper neutralization of input during web page generation ('cross-site scripting') in Azure Cosmos DB allows an unauthorized attacker to perform spoofing over a network.

Published Date: Fri Dec 19 2025 00:15:52 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Jan 16 2026 17:25:03 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Jan 16 2026 23:38:33 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 29 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: LOW

Base Score: 8.3

Base Severity: HIGH

LAST MODIFIED: 20 days ago

24. ID: CVE-2025-65041

Assigner: secure@microsoft.com

Description: Improper authorization in Microsoft Partner Center allows an unauthorized attacker to elevate privileges over a network.

Published Date: Thu Dec 18 2025 22:16:01 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Tue Jan 06 2026 16:05:51 GMT+0000 (Coordinated Universal Time)

Intake Date: Tue Jan 06 2026 16:07:42 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 19 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 10

Base Severity: CRITICAL

LAST MODIFIED: 30 days ago

25. ID: CVE-2025-64677

Assigner: secure@microsoft.com

Description: Improper neutralization of input during web page generation ('cross-site scripting') in Office Out-of-Box Experience allows an unauthorized attacker to perform spoofing over a network.

Published Date: Thu Dec 18 2025 22:16:01 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Jan 16 2026 17:28:14 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Jan 16 2026 23:38:33 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 30 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: LOW

Availability Impact: NONE

Base Score: 8.2

Base Severity: HIGH

LAST MODIFIED: 20 days ago

26. ID: CVE-2025-65037

Assigner: secure@microsoft.com

Description: Improper control of generation of code ('code injection') in Azure Container Apps allows an unauthorized attacker to execute code over a network.

Published Date: Thu Dec 18 2025 22:16:01 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Thu Jan 15 2026 21:55:28 GMT+0000 (Coordinated Universal Time)

Intake Date: Thu Jan 15 2026 21:56:32 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 28 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 10

Base Severity: CRITICAL

LAST MODIFIED: 20 days ago

27. ID: CVE-2025-64663

Assigner: secure@microsoft.com

Description: Custom Question Answering Elevation of Privilege Vulnerability

Published Date: Thu Dec 18 2025 22:16:00 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Jan 16 2026 19:53:36 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Jan 16 2026 23:38:33 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 30 days

Privileges Required: LOW

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 9.9

Base Severity: CRITICAL

LAST MODIFIED: 20 days ago

28. ID: CVE-2025-20393

Assigner: psirt@cisco.com

Description: A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges. This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.

Published Date: Wed Dec 17 2025 17:15:48 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Jan 16 2026 14:00:12 GMT+0000 (Coordinated Universal Time)

Intake Date: Thu Dec 18 2025 15:52:17 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 23 hours

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 10

Base Severity: CRITICAL

LAST MODIFIED: 20 days ago

29. ID: CVE-2025-14765

Assigner: chrome-cve-admin@google.com

Description: Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Published Date: Tue Dec 16 2025 23:15:44 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Thu Dec 18 2025 19:53:39 GMT+0000 (Coordinated Universal Time)

Intake Date: Thu Dec 18 2025 19:55:29 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 49 days ago

30. ID: CVE-2025-14766

Assigner: chrome-cve-admin@google.com

Description: Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Published Date: Tue Dec 16 2025 23:15:44 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Tue Dec 23 2025 17:06:24 GMT+0000 (Coordinated Universal Time)

Intake Date: Tue Dec 23 2025 17:07:43 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 7 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 44 days ago

31. ID: CVE-2025-14174

Assigner: chrome-cve-admin@google.com

Description: Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

Published Date: Fri Dec 12 2025 20:15:39 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Mon Dec 15 2025 15:16:08 GMT+0000 (Coordinated Universal Time)

Intake Date: Mon Dec 15 2025 16:05:24 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 52 days ago

32. ID: CVE-2025-44016

Assigner: psirt@teamviewer.com

Description: A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to bypass file integrity validation via a crafted request. By providing a valid hash for a malicious file, an attacker can cause the service to incorrectly validate and process the file as trusted, enabling arbitrary code execution under the Nomad Branch service context.

Published Date: Thu Dec 11 2025 12:16:25 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Jan 14 2026 19:57:03 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Jan 14 2026 19:58:48 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 35 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 22 days ago

33. ID: CVE-2025-64538

Assigner: psirt@adobe.com

Description: Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by injecting malicious scripts into a web page that are executed in the context of the victim's browser. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. Exploitation of this issue requires user interaction in that a victim must visit a crafted malicious page.

Published Date: Wed Dec 10 2025 19:16:15 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 19:58:16 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 19:59:35 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: NONE

Base Score: 9.3

Base Severity: CRITICAL

LAST MODIFIED: 55 days ago

34. ID: CVE-2025-64539

Assigner: psirt@adobe.com

Description: Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by injecting malicious scripts into a web page that are executed in the context of the victim's browser. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. Exploitation of this issue requires user interaction in that a victim must visit a crafted malicious page.

Published Date: Wed Dec 10 2025 19:16:15 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 19:58:13 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 19:59:35 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: NONE

Base Score: 9.3

Base Severity: CRITICAL

LAST MODIFIED: 55 days ago

35. ID: CVE-2025-64537

Assigner: psirt@adobe.com

Description: Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by injecting malicious scripts into a web page that are executed in the context of the victim's browser. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. Exploitation of this issue requires user interaction in that a victim must visit a crafted malicious page.

Published Date: Wed Dec 10 2025 19:16:14 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 19:58:19 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 19:59:35 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: NONE

Base Score: 9.3

Base Severity: CRITICAL

LAST MODIFIED: 55 days ago

36. ID: CVE-2025-61808

Assigner: psirt@adobe.com

Description: ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could lead to arbitrary code execution by a high priviledged attacker. Exploitation of this issue does not require user interaction and scope is changed.

Published Date: Wed Dec 10 2025 00:16:09 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 19:04:17 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 19:05:20 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: HIGH

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 9.1

Base Severity: CRITICAL

LAST MODIFIED: 55 days ago

37. ID: CVE-2025-61809

Assigner: psirt@adobe.com

Description: ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read and write access. Exploitation of this issue does not require user interaction and scope is unchanged.

Published Date: Wed Dec 10 2025 00:16:09 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 19:04:51 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 19:05:20 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: NONE

Base Score: 9.1

Base Severity: CRITICAL

LAST MODIFIED: 55 days ago

38. ID: CVE-2025-61810

Assigner: psirt@adobe.com

Description: ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. A high privileged attacker could exploit this vulnerability by providing maliciously crafted serialized data to the application. Exploitation of this issue requires user interaction and scope is changed.

Published Date: Wed Dec 10 2025 00:16:09 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 19:05:29 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 19:07:30 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: HIGH

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.4

Base Severity: HIGH

LAST MODIFIED: 55 days ago

39. ID: CVE-2025-61811

Assigner: psirt@adobe.com

Description: ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. A high privileged attacker could leverage this vulnerability to bypass security measures and execute malicious code. Exploitation of this issue does not require user interaction and scope is changed.

Published Date: Wed Dec 10 2025 00:16:09 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Tue Dec 16 2025 16:15:58 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 19:07:30 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: HIGH

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.4

Base Severity: HIGH

LAST MODIFIED: 51 days ago

40. ID: CVE-2025-61812

Assigner: psirt@adobe.com

Description: ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by an Improper Input Validation vulnerability that could allow a high privileged attacker to gain arbitrary code execution. Exploitation of this issue does not require user interaction.

Published Date: Wed Dec 10 2025 00:16:09 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 19:59:21 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 19:59:35 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: HIGH

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.4

Base Severity: HIGH

LAST MODIFIED: 55 days ago

41. ID: CVE-2025-61813

Assigner: psirt@adobe.com

Description: ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to access sensitive files on the server. Exploitation of this issue does not require user interaction and scope is changed.

Published Date: Wed Dec 10 2025 00:16:09 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 19:07:39 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 19:09:25 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: CHANGED

Confidentiality Impact: HIGH

Integrity Impact: NONE

Availability Impact: LOW

Base Score: 8.2

Base Severity: HIGH

LAST MODIFIED: 55 days ago

42. ID: CVE-2025-64671

Assigner: secure@microsoft.com

Description: Improper neutralization of special elements used in a command ('command injection') in Copilot allows an unauthorized attacker to execute code locally.

Published Date: Tue Dec 09 2025 18:16:06 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 13:57:32 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 13:58:35 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.4

Base Severity: HIGH

LAST MODIFIED: 55 days ago

43. ID: CVE-2025-64672

Assigner: secure@microsoft.com

Description: Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network.

Published Date: Tue Dec 09 2025 18:16:06 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 13:47:01 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 13:50:10 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 days

Privileges Required: LOW

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 55 days ago

44. ID: CVE-2025-64678

Assigner: secure@microsoft.com

Description: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

Published Date: Tue Dec 09 2025 18:16:06 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Dec 10 2025 19:02:35 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Dec 10 2025 19:05:14 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 57 days ago

45. ID: CVE-2025-64447

Assigner: psirt@fortinet.com

Description: A reliance on cookies without validation and integrity checking vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an unauthenticated attacker to execute arbitrary operations on the system via crafted HTTP or HTTPS request via forged cookies, requiring prior knowledge of the FortiWeb serial number.

Published Date: Tue Dec 09 2025 18:16:05 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Tue Dec 09 2025 20:40:27 GMT+0000 (Coordinated Universal Time)

Intake Date: Tue Dec 09 2025 20:42:16 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 3 hours

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.1

Base Severity: HIGH

LAST MODIFIED: 58 days ago

46. ID: CVE-2025-62557

Assigner: secure@microsoft.com

Description: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Published Date: Tue Dec 09 2025 18:16:01 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Dec 10 2025 15:41:46 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Dec 10 2025 15:47:01 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 22 hours

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.4

Base Severity: HIGH

LAST MODIFIED: 57 days ago

47. ID: CVE-2025-62550

Assigner: secure@microsoft.com

Description: Out-of-bounds write in Azure Monitor Agent allows an authorized attacker to execute code over a network.

Published Date: Tue Dec 09 2025 18:16:00 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Dec 10 2025 19:23:31 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Dec 10 2025 19:24:59 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: LOW

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 57 days ago

48. ID: CVE-2025-62554

Assigner: secure@microsoft.com

Description: Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.

Published Date: Tue Dec 09 2025 18:16:00 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Dec 10 2025 18:37:25 GMT+0000 (Coordinated Universal Time)

Intake Date: Wed Dec 10 2025 18:39:13 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 2 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.4

Base Severity: HIGH

LAST MODIFIED: 57 days ago

49. ID: CVE-2025-62549

Assigner: secure@microsoft.com

Description: Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

Published Date: Tue Dec 09 2025 18:15:59 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Wed Dec 24 2025 15:16:01 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 20:06:47 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 4 days

Privileges Required: NONE

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 43 days ago

50. ID: CVE-2025-62456

Assigner: secure@microsoft.com

Description: Heap-based buffer overflow in Windows Resilient File System (ReFS) allows an authorized attacker to execute code over a network.

Published Date: Tue Dec 09 2025 18:15:57 GMT+0000 (Coordinated Universal Time)

Last Modified Date: Fri Dec 12 2025 20:03:27 GMT+0000 (Coordinated Universal Time)

Intake Date: Fri Dec 12 2025 20:04:48 GMT+0000 (Coordinated Universal Time)

Analysis Latency: 4 days

Privileges Required: LOW

User Interaction: V31Deprecated

Scope: UNCHANGED

Confidentiality Impact: HIGH

Integrity Impact: HIGH

Availability Impact: HIGH

Base Score: 8.8

Base Severity: HIGH

LAST MODIFIED: 55 days ago