CVE-2025-21189 |
Description: MapUrlToZone Security Feature Bypass Vulnerability
CVSS: MEDIUM (4.3) EPSS Score: 0.05%
January 28th, 2025 (5 months ago)
|
CVE-2025-21187 |
Description: Microsoft Power Automate Remote Code Execution Vulnerability
CVSS: HIGH (7.8) EPSS Score: 0.06%
January 28th, 2025 (5 months ago)
|
CVE-2025-21186 |
Description: Microsoft Access Remote Code Execution Vulnerability
CVSS: HIGH (7.8) EPSS Score: 0.05%
January 28th, 2025 (5 months ago)
|
CVE-2025-21185 |
Description: Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVSS: MEDIUM (6.5) EPSS Score: 0.09%
January 28th, 2025 (5 months ago)
|
CVE-2025-21178 |
Description: Visual Studio Remote Code Execution Vulnerability
CVSS: HIGH (8.8) EPSS Score: 0.11%
January 28th, 2025 (5 months ago)
|
CVE-2025-21176 |
Description: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVSS: HIGH (8.8) EPSS Score: 0.1%
January 28th, 2025 (5 months ago)
|
CVE-2025-21173 |
Description: .NET Elevation of Privilege Vulnerability
CVSS: HIGH (7.3) EPSS Score: 0.05%
January 28th, 2025 (5 months ago)
|
CVE-2025-21172 |
Description: .NET and Visual Studio Remote Code Execution Vulnerability
CVSS: HIGH (7.5) EPSS Score: 0.09%
January 28th, 2025 (5 months ago)
|
CVE-2025-21171 |
Description: .NET Remote Code Execution Vulnerability
CVSS: HIGH (7.5) EPSS Score: 0.05%
January 28th, 2025 (5 months ago)
|
CVE-2025-0753 |
Description: A vulnerability classified as critical was found in Axiomatic Bento4 up to 1.6.0. This vulnerability affects the function AP4_StdcFileByteStream::ReadPartial of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. In Axiomatic Bento4 bis 1.6.0 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Dabei geht es um die Funktion AP4_StdcFileByteStream::ReadPartial der Komponente mp42aac. Mittels dem Manipulieren mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
CVSS: MEDIUM (6.9) EPSS Score: 0.05%
January 28th, 2025 (5 months ago)
|