Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-21479

🚨 Marked as known exploited on June 3rd, 2025 (3 days ago).
Description: Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.

CVSS: HIGH (8.6)

EPSS Score: 3.15%

Source: CVE
June 3rd, 2025 (3 days ago)
🚨 Marked as known exploited on June 2nd, 2025 (3 days ago).
Description: Google has released its June 2025 Android Security Bulletin, patching multiple high-severity vulnerabilities, including three critical Qualcomm zero-days that were confirmed to be under active, targeted exploitation. According to Qualcomm’s security bulletin, the actively exploited vulnerabilities, CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038, affect Adreno GPU drivers. These flaws allow unauthorized command execution or memory corruption through specific … The post Android Fixes Actively Exploited Zero-Days in Qualcomm Components appeared first on CyberInsider.

CVSS: HIGH (8.6)

EPSS Score: 3.15%

Source: CyberInsider
June 2nd, 2025 (3 days ago)
🚨 Marked as known exploited on May 13th, 2025 (23 days ago).
Description: Microsoft has released its monthly security update for May of 2025 which includes 78 vulnerabilities affecting a range of products, including 11 that Microsoft marked as “critical”.  Microsoft noted five vulnerabilities that have been observed to be exploited in the wild. CVE-2025-30397 is a remote code

CVSS: HIGH (7.5)

EPSS Score: 10.87%

Source: Cisco Talos Blog
May 13th, 2025 (23 days ago)
🚨 Marked as known exploited on May 13th, 2025 (23 days ago).
Description: 5Critical66Important0Moderate0LowMicrosoft addresses 71 CVEs including seven zero-days, five of which were exploited in the wild.Microsoft patched 71 CVEs in its May 2025 Patch Tuesday release, with five rated critical and 66 rated as important.This month’s update includes patches for:.NET, Visual Studio, and Build Tools for Visual StudioActive Directory Certificate Services (AD CS)AzureAzure AutomationAzure DevOpsAzure File SyncAzure Storage Resource ProviderMicrosoft Brokering File SystemMicrosoft DataverseMicrosoft Defender for EndpointMicrosoft Defender for IdentityMicrosoft Edge (Chromium-based)Microsoft OfficeMicrosoft Office ExcelMicrosoft Office OutlookMicrosoft Office PowerPointMicrosoft Office SharePointMicrosoft PC ManagerMicrosoft Power AppsMicrosoft Scripting EngineRemote Desktop Gateway ServiceRole: Windows Hyper-VUniversal Print Management ServiceUrlMonVisual StudioVisual Studio CodeWeb Threat Defense (WTD.sys)Windows Ancillary Function Driver for WinSockWindows Common Log File System DriverWindows Deployment ServicesWindows DriversWindows DWMWindows File ServerWindows FundamentalsWindows Hardware Lab KitWindows InstallerWindows KernelWindows LDAP - Lightweight Directory Access ProtocolWindows MediaWindows NTFSWindows Remote DesktopWindows Routing and Remote Access Service (RRAS)Windows Secure Kernel ModeWindows SMBWindows Trusted Runtime Interface DriverWindows Virtual Machine BusWindows Win32K - GRFXRemote code execution (RCE) vulnerabilities accounted for...

CVSS: HIGH (7.8)

EPSS Score: 4.24%

Source: Tenable Blog
May 13th, 2025 (23 days ago)

CVE-2025-32709

🚨 Marked as known exploited on May 13th, 2025 (23 days ago).
Description: Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

CVSS: HIGH (7.8)

EPSS Score: 4.28%

Source: CVE
May 13th, 2025 (23 days ago)

CVE-2025-32706

🚨 Marked as known exploited on May 13th, 2025 (23 days ago).
Description: Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

CVSS: HIGH (7.8)

EPSS Score: 10.51%

Source: CVE
May 13th, 2025 (23 days ago)

CVE-2025-32701

🚨 Marked as known exploited on May 13th, 2025 (23 days ago).
Description: Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

CVSS: HIGH (7.8)

EPSS Score: 4.24%

Source: CVE
May 13th, 2025 (23 days ago)

CVE-2025-30400

🚨 Marked as known exploited on May 13th, 2025 (23 days ago).
Description: Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.

CVSS: HIGH (7.8)

EPSS Score: 4.24%

Source: CVE
May 13th, 2025 (23 days ago)

CVE-2025-30397

🚨 Marked as known exploited on May 13th, 2025 (23 days ago).
Description: Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.

CVSS: HIGH (7.5)

EPSS Score: 10.87%

Source: CVE
May 13th, 2025 (23 days ago)

CVE-2025-4428

🚨 Marked as known exploited on May 19th, 2025 (17 days ago).
Description: Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests.

CVSS: HIGH (7.2)

EPSS Score: 38.31%

Source: CVE
May 13th, 2025 (24 days ago)