instruction
stringlengths 55
56
| inputs
stringclasses 1
value | outputs
stringlengths 86
4.06k
|
---|---|---|
Please provide detailed information about CVE-2025-21174
|
CVE:CVE-2025-21174
Description:Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:44.667
|
|
Please provide detailed information about CVE-2025-21191
|
CVE:CVE-2025-21191
Description:Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:44.857
|
|
Please provide detailed information about CVE-2025-21197
|
CVE:CVE-2025-21197
Description:Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content.
published:2025-04-08T18:15:45.020
|
|
Please provide detailed information about CVE-2025-21203
|
CVE:CVE-2025-21203
Description:Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
published:2025-04-08T18:15:45.190
|
|
Please provide detailed information about CVE-2025-21204
|
CVE:CVE-2025-21204
Description:Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:45.343
|
|
Please provide detailed information about CVE-2025-21205
|
CVE:CVE-2025-21205
Description:Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:45.513
|
|
Please provide detailed information about CVE-2025-21221
|
CVE:CVE-2025-21221
Description:Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:45.673
|
|
Please provide detailed information about CVE-2025-21222
|
CVE:CVE-2025-21222
Description:Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:45.850
|
|
Please provide detailed information about CVE-2025-24058
|
CVE:CVE-2025-24058
Description:Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:46.037
|
|
Please provide detailed information about CVE-2025-24060
|
CVE:CVE-2025-24060
Description:Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:46.193
|
|
Please provide detailed information about CVE-2025-24062
|
CVE:CVE-2025-24062
Description:Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:46.353
|
|
Please provide detailed information about CVE-2025-24073
|
CVE:CVE-2025-24073
Description:Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:46.543
|
|
Please provide detailed information about CVE-2025-24074
|
CVE:CVE-2025-24074
Description:Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:46.740
|
|
Please provide detailed information about CVE-2025-25002
|
CVE:CVE-2025-25002
Description:Insertion of sensitive information into log file in Azure Local Cluster allows an authorized attacker to disclose information over an adjacent network.
published:2025-04-08T18:15:47.030
|
|
Please provide detailed information about CVE-2025-26628
|
CVE:CVE-2025-26628
Description:Insufficiently protected credentials in Azure Local Cluster allows an authorized attacker to disclose information locally.
published:2025-04-08T18:15:47.180
|
|
Please provide detailed information about CVE-2025-26635
|
CVE:CVE-2025-26635
Description:Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.
published:2025-04-08T18:15:47.337
|
|
Please provide detailed information about CVE-2025-26637
|
CVE:CVE-2025-26637
Description:Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
published:2025-04-08T18:15:47.490
|
|
Please provide detailed information about CVE-2025-26639
|
CVE:CVE-2025-26639
Description:Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:47.657
|
|
Please provide detailed information about CVE-2025-26640
|
CVE:CVE-2025-26640
Description:Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:47.817
|
|
Please provide detailed information about CVE-2025-26641
|
CVE:CVE-2025-26641
Description:Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:47.990
|
|
Please provide detailed information about CVE-2025-26642
|
CVE:CVE-2025-26642
Description:Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:15:48.160
|
|
Please provide detailed information about CVE-2025-26644
|
CVE:CVE-2025-26644
Description:Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally.
published:2025-04-08T18:15:48.347
|
|
Please provide detailed information about CVE-2025-26647
|
CVE:CVE-2025-26647
Description:Improper input validation in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.
published:2025-04-08T18:15:48.510
|
|
Please provide detailed information about CVE-2025-26648
|
CVE:CVE-2025-26648
Description:Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:48.667
|
|
Please provide detailed information about CVE-2025-26649
|
CVE:CVE-2025-26649
Description:Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:48.843
|
|
Please provide detailed information about CVE-2025-26651
|
CVE:CVE-2025-26651
Description:Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
published:2025-04-08T18:15:49.007
|
|
Please provide detailed information about CVE-2025-26652
|
CVE:CVE-2025-26652
Description:Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:49.157
|
|
Please provide detailed information about CVE-2025-26663
|
CVE:CVE-2025-26663
Description:Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:49.337
|
|
Please provide detailed information about CVE-2025-26664
|
CVE:CVE-2025-26664
Description:Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
published:2025-04-08T18:15:49.510
|
|
Please provide detailed information about CVE-2025-26665
|
CVE:CVE-2025-26665
Description:Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:49.670
|
|
Please provide detailed information about CVE-2025-26666
|
CVE:CVE-2025-26666
Description:Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally.
published:2025-04-08T18:15:49.833
|
|
Please provide detailed information about CVE-2025-26667
|
CVE:CVE-2025-26667
Description:Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
published:2025-04-08T18:15:50.000
|
|
Please provide detailed information about CVE-2025-26668
|
CVE:CVE-2025-26668
Description:Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:50.160
|
|
Please provide detailed information about CVE-2025-26669
|
CVE:CVE-2025-26669
Description:Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
published:2025-04-08T18:15:50.347
|
|
Please provide detailed information about CVE-2025-26670
|
CVE:CVE-2025-26670
Description:Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:50.817
|
|
Please provide detailed information about CVE-2025-26671
|
CVE:CVE-2025-26671
Description:Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:51.003
|
|
Please provide detailed information about CVE-2025-26672
|
CVE:CVE-2025-26672
Description:Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
published:2025-04-08T18:15:51.177
|
|
Please provide detailed information about CVE-2025-26673
|
CVE:CVE-2025-26673
Description:Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:51.350
|
|
Please provide detailed information about CVE-2025-26674
|
CVE:CVE-2025-26674
Description:Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally.
published:2025-04-08T18:15:51.553
|
|
Please provide detailed information about CVE-2025-26675
|
CVE:CVE-2025-26675
Description:Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:51.757
|
|
Please provide detailed information about CVE-2025-26676
|
CVE:CVE-2025-26676
Description:Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
published:2025-04-08T18:15:52.023
|
|
Please provide detailed information about CVE-2025-26678
|
CVE:CVE-2025-26678
Description:Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally.
published:2025-04-08T18:15:52.303
|
|
Please provide detailed information about CVE-2025-26679
|
CVE:CVE-2025-26679
Description:Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:52.463
|
|
Please provide detailed information about CVE-2025-26680
|
CVE:CVE-2025-26680
Description:Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:52.667
|
|
Please provide detailed information about CVE-2025-26681
|
CVE:CVE-2025-26681
Description:Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:52.863
|
|
Please provide detailed information about CVE-2025-26682
|
CVE:CVE-2025-26682
Description:Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:53.033
|
|
Please provide detailed information about CVE-2025-26686
|
CVE:CVE-2025-26686
Description:Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:53.220
|
|
Please provide detailed information about CVE-2025-26687
|
CVE:CVE-2025-26687
Description:Use after free in Windows Win32K - GRFX allows an unauthorized attacker to elevate privileges over a network.
published:2025-04-08T18:15:53.383
|
|
Please provide detailed information about CVE-2025-26688
|
CVE:CVE-2025-26688
Description:Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:53.550
|
|
Please provide detailed information about CVE-2025-27182
|
CVE:CVE-2025-27182
Description:After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:53.740
|
|
Please provide detailed information about CVE-2025-27183
|
CVE:CVE-2025-27183
Description:After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:53.937
|
|
Please provide detailed information about CVE-2025-27184
|
CVE:CVE-2025-27184
Description:After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:54.090
|
|
Please provide detailed information about CVE-2025-27185
|
CVE:CVE-2025-27185
Description:After Effects versions 25.1, 24.6.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:54.233
|
|
Please provide detailed information about CVE-2025-27186
|
CVE:CVE-2025-27186
Description:After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:54.380
|
|
Please provide detailed information about CVE-2025-27187
|
CVE:CVE-2025-27187
Description:After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:54.540
|
|
Please provide detailed information about CVE-2025-27193
|
CVE:CVE-2025-27193
Description:Bridge versions 14.1.5, 15.0.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:54.687
|
|
Please provide detailed information about CVE-2025-27194
|
CVE:CVE-2025-27194
Description:Media Encoder versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:54.853
|
|
Please provide detailed information about CVE-2025-27195
|
CVE:CVE-2025-27195
Description:Media Encoder versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:55.027
|
|
Please provide detailed information about CVE-2025-27196
|
CVE:CVE-2025-27196
Description:Premiere Pro versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:55.170
|
|
Please provide detailed information about CVE-2025-27198
|
CVE:CVE-2025-27198
Description:Photoshop Desktop versions 25.12.1, 26.4.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:55.323
|
|
Please provide detailed information about CVE-2025-27199
|
CVE:CVE-2025-27199
Description:Animate versions 24.0.7, 23.0.10 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:55.477
|
|
Please provide detailed information about CVE-2025-27200
|
CVE:CVE-2025-27200
Description:Animate versions 24.0.7, 23.0.10 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:55.630
|
|
Please provide detailed information about CVE-2025-27201
|
CVE:CVE-2025-27201
Description:Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:55.787
|
|
Please provide detailed information about CVE-2025-27202
|
CVE:CVE-2025-27202
Description:Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:55.960
|
|
Please provide detailed information about CVE-2025-27204
|
CVE:CVE-2025-27204
Description:After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2025-04-08T18:15:56.130
|
|
Please provide detailed information about CVE-2025-27205
|
CVE:CVE-2025-27205
Description:Adobe Experience Manager Screens versions FP11.3 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. Exploitation of this issue requires user interaction in that a victim must open a malicious link.
published:2025-04-08T18:15:56.290
|
|
Please provide detailed information about CVE-2025-27467
|
CVE:CVE-2025-27467
Description:Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:56.453
|
|
Please provide detailed information about CVE-2025-27469
|
CVE:CVE-2025-27469
Description:Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:56.613
|
|
Please provide detailed information about CVE-2025-27470
|
CVE:CVE-2025-27470
Description:Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:56.797
|
|
Please provide detailed information about CVE-2025-27471
|
CVE:CVE-2025-27471
Description:Sensitive data storage in improperly locked memory in Microsoft Streaming Service allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:56.970
|
|
Please provide detailed information about CVE-2025-27472
|
CVE:CVE-2025-27472
Description:Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature over a network.
published:2025-04-08T18:15:57.140
|
|
Please provide detailed information about CVE-2025-27473
|
CVE:CVE-2025-27473
Description:Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:57.290
|
|
Please provide detailed information about CVE-2025-27474
|
CVE:CVE-2025-27474
Description:Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
published:2025-04-08T18:15:57.457
|
|
Please provide detailed information about CVE-2025-27475
|
CVE:CVE-2025-27475
Description:Sensitive data storage in improperly locked memory in Windows Update Stack allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:57.620
|
|
Please provide detailed information about CVE-2025-27476
|
CVE:CVE-2025-27476
Description:Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:57.777
|
|
Please provide detailed information about CVE-2025-27477
|
CVE:CVE-2025-27477
Description:Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:57.947
|
|
Please provide detailed information about CVE-2025-27478
|
CVE:CVE-2025-27478
Description:Heap-based buffer overflow in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:58.120
|
|
Please provide detailed information about CVE-2025-27479
|
CVE:CVE-2025-27479
Description:Insufficient resource pool in Windows Kerberos allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:58.287
|
|
Please provide detailed information about CVE-2025-27480
|
CVE:CVE-2025-27480
Description:Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:58.447
|
|
Please provide detailed information about CVE-2025-27481
|
CVE:CVE-2025-27481
Description:Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:58.610
|
|
Please provide detailed information about CVE-2025-27482
|
CVE:CVE-2025-27482
Description:Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
published:2025-04-08T18:15:58.773
|
|
Please provide detailed information about CVE-2025-27483
|
CVE:CVE-2025-27483
Description:Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
published:2025-04-08T18:15:58.943
|
|
Please provide detailed information about CVE-2025-27484
|
CVE:CVE-2025-27484
Description:Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network.
published:2025-04-08T18:15:59.130
|
|
Please provide detailed information about CVE-2025-27485
|
CVE:CVE-2025-27485
Description:Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:59.300
|
|
Please provide detailed information about CVE-2025-27486
|
CVE:CVE-2025-27486
Description:Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
published:2025-04-08T18:15:59.450
|
|
Please provide detailed information about CVE-2025-27487
|
CVE:CVE-2025-27487
Description:Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.
published:2025-04-08T18:15:59.620
|
|
Please provide detailed information about CVE-2025-27489
|
CVE:CVE-2025-27489
Description:Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:59.787
|
|
Please provide detailed information about CVE-2025-27490
|
CVE:CVE-2025-27490
Description:Heap-based buffer overflow in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:15:59.953
|
|
Please provide detailed information about CVE-2025-27491
|
CVE:CVE-2025-27491
Description:Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network.
published:2025-04-08T18:16:00.140
|
|
Please provide detailed information about CVE-2025-27492
|
CVE:CVE-2025-27492
Description:Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:00.313
|
|
Please provide detailed information about CVE-2025-27727
|
CVE:CVE-2025-27727
Description:Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:00.477
|
|
Please provide detailed information about CVE-2025-27728
|
CVE:CVE-2025-27728
Description:Out-of-bounds read in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:00.653
|
|
Please provide detailed information about CVE-2025-27729
|
CVE:CVE-2025-27729
Description:Use after free in Windows Shell allows an unauthorized attacker to execute code locally.
published:2025-04-08T18:16:00.813
|
|
Please provide detailed information about CVE-2025-27730
|
CVE:CVE-2025-27730
Description:Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:00.990
|
|
Please provide detailed information about CVE-2025-27731
|
CVE:CVE-2025-27731
Description:Improper input validation in OpenSSH for Windows allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:01.163
|
|
Please provide detailed information about CVE-2025-27732
|
CVE:CVE-2025-27732
Description:Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
published:2025-04-08T18:16:01.333
|
|
Please provide detailed information about CVE-2025-27733
|
CVE:CVE-2025-27733
Description:Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
published:2025-04-08T18:16:01.517
|
|
Please provide detailed information about CVE-2025-27735
|
CVE:CVE-2025-27735
Description:Insufficient verification of data authenticity in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally.
published:2025-04-08T18:16:01.697
|
|
Please provide detailed information about CVE-2025-27736
|
CVE:CVE-2025-27736
Description:Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally.
published:2025-04-08T18:16:01.913
|
|
Please provide detailed information about CVE-2025-27737
|
CVE:CVE-2025-27737
Description:Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally.
published:2025-04-08T18:16:02.097
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.