Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Total 20988 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-34716 1 Microsoft 3 .net, .net Core, Powershell 2025-05-29 N/A 5.9 MEDIUM
.NET Spoofing Vulnerability
CVE-2022-37347 2 Microsoft, Trendmicro 2 Windows, Security 2025-05-29 N/A 5.5 MEDIUM
Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure Vulnerability that could allow an attacker to read sensitive information from other memory locations and cause a crash on an affected machine. This vulnerability is similar to, but not the same as CVE-2022-35234.
CVE-2022-35782 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 N/A 6.5 MEDIUM
Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2022-35781 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 N/A 6.5 MEDIUM
Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2022-35780 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 N/A 6.5 MEDIUM
Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2022-35779 1 Microsoft 1 Azure Real Time Operating System Guix Studio 2025-05-29 N/A 7.8 HIGH
Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-35777 1 Microsoft 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more 2025-05-29 N/A 8.8 HIGH
Visual Studio Remote Code Execution Vulnerability
CVE-2022-35776 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 N/A 6.2 MEDIUM
Azure Site Recovery Denial of Service Vulnerability
CVE-2022-35775 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 N/A 6.5 MEDIUM
Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2022-35774 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 N/A 4.9 MEDIUM
Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2022-35773 1 Microsoft 1 Azure Real Time Operating System Guix Studio 2025-05-29 N/A 7.8 HIGH
Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2024-21413 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-05-29 N/A 9.8 CRITICAL
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2025-24054 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-05-29 N/A 6.5 MEDIUM
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-24985 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-05-29 N/A 7.8 HIGH
Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
CVE-2025-30397 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-05-29 N/A 7.5 HIGH
Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
CVE-2024-23940 2 Microsoft, Trendmicro 6 Windows, Air Support, Antivirus \+ Security and 3 more 2025-05-29 N/A 7.8 HIGH
Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultimately escalate privileges on an affected system.
CVE-2025-21224 1 Microsoft 8 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 5 more 2025-05-29 N/A 8.1 HIGH
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
CVE-2014-1776 1 Microsoft 11 Internet Explorer, Windows 7, Windows 8 and 8 more 2025-05-29 10.0 HIGH 9.8 CRITICAL
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."
CVE-2025-34028 3 Commvault, Linux, Microsoft 3 Commvault, Linux Kernel, Windows 2025-05-29 N/A 10.0 CRITICAL
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
CVE-2025-3928 3 Commvault, Linux, Microsoft 3 Commvault, Linux Kernel, Windows 2025-05-28 N/A 8.8 HIGH
Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms. This vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) Catalog on 2025-04-28.