CVE-2025-47181 |
Description: Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally.
CVSS: HIGH (8.8) EPSS Score: 0.06%
May 22nd, 2025 (11 days ago)
|
![]() |
Description: This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft PC Manager. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2025-29975.
CVSS: HIGH (7.8) EPSS Score: 0.06%
May 21st, 2025 (12 days ago)
|
CVE-2025-47161 |
Description: Microsoft Defender for Endpoint Elevation of Privilege Vulnerability
CVSS: HIGH (7.8) EPSS Score: 0.05% SSVC Exploitation: none
May 15th, 2025 (18 days ago)
|
CVE-2024-0056 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v3 8.7
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Siemens
Equipment: INTRALOG WMS
Vulnerabilities: Cleartext Transmission of Sensitive Information, Uncontrolled Resource Consumption, Use After Free, Improper Link Resolution Before File Access ('Link Following'), Improper Input Validation, Inefficient Algorithmic Complexity
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to bypass security features, cause a denial-of-service condition, or execute arbitrary code.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
Siemens INTRALOG WMS: All versions prior to v5
3.2 VULNERABILITY OVERVIEW
3.2.1 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability
CVE-2024-0056 has been assigned to this vulnerability. A CVSS v3 base score of 8.7 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N).
3.2.2 UNCONTROLLED RESOURCE CONSUMPTION CWE-400
.NET Denial-of-Service Vulnerability
CVE-2024...
CVSS: HIGH (8.7)
May 15th, 2025 (18 days ago)
|
CVE-2025-26646 |
Description: External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.
CVSS: HIGH (8.0) EPSS Score: 0.03%
May 13th, 2025 (20 days ago)
|
![]() |
Description: Microsoft Security Advisory CVE-2025-26646: .NET Spoofing Vulnerability
Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 9.0.xxx and .NET 8.0.xxx SDK. This advisory also provides guidance on what developers can do to update their applications to address this vulnerability.
A vulnerability exists in .NET SDK or MSBuild applications where external control of file name or path allows an unauthorized attacked to perform spoofing over a network.
Discussion
Discussion for this issue can be found at https://github.com/dotnet/msbuild/issues/11846
Mitigation factors
Projects which do not utilize the DownloadFile build task are not susceptible to this vulnerability.
Affected software
Any installation of .NET 9.0.105 SDK, .NET 9.0.203 SDK or earlier.
Any installation of .NET 8.0.115 SDK, .NET 8.0.311 SDK, .NET 8.0.408 SDK or earlier.
Affected Packages
The vulnerability affects any Microsoft .NET Core project if it uses any of affected packages versions listed below
Package name
Affected version
Patched version
Microsoft.Build.Tasks.Core
>= 15.8.166, <=15.9.20>=16.0.461, <= 16.11.0>= 17.0.0, <= 17.8.3>= 17.9.5, <= 17.10.417.11.417.12.6 17.13.9
15.9.3016.11.617.8.2917.10.2917.12.3617.13.26 17.14.8
Advisory FAQ
How do I know if I am affected?
If you have a .NET SDK with a version listed, or an affected package listed in affected software or affected packages, you're exposed to the vulnerability.
How do I fix ...
CVSS: HIGH (8.0) EPSS Score: 0.03%
May 13th, 2025 (20 days ago)
|
![]() |
🚨 Marked as known exploited on May 13th, 2025 (20 days ago).
Description: Microsoft has released its monthly security update for May of 2025 which includes 78 vulnerabilities affecting a range of products, including 11 that Microsoft marked as “critical”. Microsoft noted five vulnerabilities that have been observed to be exploited in the wild. CVE-2025-30397 is a remote code
CVSS: HIGH (7.5) EPSS Score: 10.87%
May 13th, 2025 (20 days ago)
|
![]() |
🚨 Marked as known exploited on May 13th, 2025 (20 days ago).
Description: 5Critical66Important0Moderate0LowMicrosoft addresses 71 CVEs including seven zero-days, five of which were exploited in the wild.Microsoft patched 71 CVEs in its May 2025 Patch Tuesday release, with five rated critical and 66 rated as important.This month’s update includes patches for:.NET, Visual Studio, and Build Tools for Visual StudioActive Directory Certificate Services (AD CS)AzureAzure AutomationAzure DevOpsAzure File SyncAzure Storage Resource ProviderMicrosoft Brokering File SystemMicrosoft DataverseMicrosoft Defender for EndpointMicrosoft Defender for IdentityMicrosoft Edge (Chromium-based)Microsoft OfficeMicrosoft Office ExcelMicrosoft Office OutlookMicrosoft Office PowerPointMicrosoft Office SharePointMicrosoft PC ManagerMicrosoft Power AppsMicrosoft Scripting EngineRemote Desktop Gateway ServiceRole: Windows Hyper-VUniversal Print Management ServiceUrlMonVisual StudioVisual Studio CodeWeb Threat Defense (WTD.sys)Windows Ancillary Function Driver for WinSockWindows Common Log File System DriverWindows Deployment ServicesWindows DriversWindows DWMWindows File ServerWindows FundamentalsWindows Hardware Lab KitWindows InstallerWindows KernelWindows LDAP - Lightweight Directory Access ProtocolWindows MediaWindows NTFSWindows Remote DesktopWindows Routing and Remote Access Service (RRAS)Windows Secure Kernel ModeWindows SMBWindows Trusted Runtime Interface DriverWindows Virtual Machine BusWindows Win32K - GRFXRemote code execution (RCE) vulnerabilities accounted for...
CVSS: HIGH (7.8) EPSS Score: 3.71%
May 13th, 2025 (20 days ago)
|
CVE-2025-30400 |
Description: Microsoft Windows DWM Core Library contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.
CVSS: HIGH (7.8) EPSS Score: 3.71%
May 13th, 2025 (20 days ago)
|
CVE-2025-32701 |
Description: Microsoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.
CVSS: HIGH (7.8) EPSS Score: 3.71%
May 13th, 2025 (20 days ago)
|