Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Windows
Total 8390 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-24916 2 Checkpoint, Microsoft 2 Smartconsole, Windows 2025-09-04 N/A 6.5 MEDIUM
Untrusted DLLs in the installer's directory may be loaded and executed, leading to potentially arbitrary code execution with the installer's privileges (admin).
CVE-2024-51736 2 Microsoft, Sensiolabs 2 Windows, Symfony 2025-09-04 N/A N/A
Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-24915 2 Checkpoint, Microsoft 2 Smartconsole, Windows 2025-09-03 N/A 6.1 MEDIUM
Credentials are not cleared from memory after being used. A user with Administrator permissions can execute memory dump for SmartConsole process and fetch them.
CVE-2025-9478 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2025-09-02 N/A 8.8 HIGH
Use after free in ANGLE in Google Chrome prior to 139.0.7258.154 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
CVE-2023-38581 2 Intel, Microsoft 2 Power Gadget, Windows 2025-09-02 N/A 8.8 HIGH
Buffer overflow in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-28952 2 Intel, Microsoft 3 Integrated Performance Primitives, Oneapi Base Toolkit, Windows 2025-09-02 N/A 6.7 MEDIUM
Uncontrolled search path for some Intel(R) IPP software for Windows before version 2021.12.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-41234 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 5.0 MEDIUM
NULL pointer dereference in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-42773 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 8.8 HIGH
Improper neutralization in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-45217 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 8.8 HIGH
Improper access control in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-45315 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 5.5 MEDIUM
Improper initialization in some Intel(R) Power Gadget software for Windwos all versions may allow an authenticated user to potentially enable denial of service via local access.
CVE-2023-45736 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 6.7 MEDIUM
Insecure inherited permissions in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2023-46691 2 Intel, Microsoft 2 Power Gadget, Windows 2025-08-28 N/A 7.9 HIGH
Use after free in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2024-45673 3 Ibm, Linux, Microsoft 5 Security Verify Bridge Directory Sync, Security Verify Gateway For Radius, Security Verify Gateway For Windows Login and 2 more 2025-08-27 N/A 5.5 MEDIUM
IBM Security Verify Bridge Directory Sync 1.0.1 through 1.0.12, IBM Security Verify Gateway for Windows Login 1.0.1 through 1.0.10, and IBM Security Verify Gateway for Radius 1.0.1 through 1.0.11 stores user credentials in configuration files which can be read by a local user.
CVE-2025-49385 2 Microsoft, Trendmicro 2 Windows, Maximum Security 2022 2025-08-26 N/A 7.8 HIGH
Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.
CVE-2025-49384 2 Microsoft, Trendmicro 2 Windows, Maximum Security 2022 2025-08-26 N/A 7.8 HIGH
Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.
CVE-2024-24912 2 Checkpoint, Microsoft 2 Harmony Endpoint, Windows 2025-08-26 N/A 6.7 MEDIUM
A local privilege escalation vulnerability has been identified in Harmony Endpoint Security Client for Windows versions E88.10 and below. To exploit this vulnerability, an attacker must first obtain the ability to execute local privileged code on the target system.
CVE-2025-52521 2 Microsoft, Trendmicro 2 Windows, Maximum Security 2022 2025-08-26 N/A 7.8 HIGH
Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own.
CVE-2025-4609 2 Google, Microsoft 2 Chrome, Windows 2025-08-25 N/A 9.6 CRITICAL
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 136.0.7103.113 allowed a remote attacker to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)
CVE-2024-38864 2 Checkmk, Microsoft 2 Checkmk, Windows 2025-08-25 N/A 3.3 LOW
Incorrect permissions on the Checkmk Windows Agent's data directory in Checkmk < 2.3.0p23, < 2.2.0p38 and <= 2.1.0p49 (EOL) allows a local attacker to read sensitive data.
CVE-2024-29072 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2025-08-22 N/A 8.2 HIGH
A privilege escalation vulnerability exists in the Foxit Reader 2024.2.0.25138. The vulnerability occurs due to improper certification validation of the updater executable before executing it. A low privilege user can trigger the update action which can result in unexpected elevation of privilege.