CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-21189

Description: MapUrlToZone Security Feature Bypass Vulnerability

CVSS: MEDIUM (4.3)

EPSS Score: 0.05%

Source: CVE
January 28th, 2025 (5 months ago)

CVE-2025-21187

Description: Microsoft Power Automate Remote Code Execution Vulnerability

CVSS: HIGH (7.8)

EPSS Score: 0.06%

Source: CVE
January 28th, 2025 (5 months ago)

CVE-2025-21186

Description: Microsoft Access Remote Code Execution Vulnerability

CVSS: HIGH (7.8)

EPSS Score: 0.05%

Source: CVE
January 28th, 2025 (5 months ago)

CVE-2025-21185

Description: Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability

CVSS: MEDIUM (6.5)

EPSS Score: 0.09%

Source: CVE
January 28th, 2025 (5 months ago)

CVE-2025-21178

Description: Visual Studio Remote Code Execution Vulnerability

CVSS: HIGH (8.8)

EPSS Score: 0.11%

Source: CVE
January 28th, 2025 (5 months ago)

CVE-2025-21176

Description: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

CVSS: HIGH (8.8)

EPSS Score: 0.1%

Source: CVE
January 28th, 2025 (5 months ago)

CVE-2025-21173

Description: .NET Elevation of Privilege Vulnerability

CVSS: HIGH (7.3)

EPSS Score: 0.05%

Source: CVE
January 28th, 2025 (5 months ago)

CVE-2025-21172

Description: .NET and Visual Studio Remote Code Execution Vulnerability

CVSS: HIGH (7.5)

EPSS Score: 0.09%

Source: CVE
January 28th, 2025 (5 months ago)

CVE-2025-21171

Description: .NET Remote Code Execution Vulnerability

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
January 28th, 2025 (5 months ago)

CVE-2025-0753

Description: A vulnerability classified as critical was found in Axiomatic Bento4 up to 1.6.0. This vulnerability affects the function AP4_StdcFileByteStream::ReadPartial of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. In Axiomatic Bento4 bis 1.6.0 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Dabei geht es um die Funktion AP4_StdcFileByteStream::ReadPartial der Komponente mp42aac. Mittels dem Manipulieren mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.

CVSS: MEDIUM (6.9)

EPSS Score: 0.05%

Source: CVE
January 28th, 2025 (5 months ago)