cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-21396,https://securityvulnerability.io/vulnerability/CVE-2025-21396,Elevation of Privilege Vulnerability in Microsoft Account by Microsoft,"An elevation of privilege vulnerability exists in Microsoft Account due to missing authorization checks. This flaw enables an unauthorized attacker to exploit this weakness over a network, potentially leading to unauthorized access and control over user accounts.",Microsoft,Microsoft Account,7.5,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-01-29T23:15:00.000Z,0 CVE-2025-21415,https://securityvulnerability.io/vulnerability/CVE-2025-21415,Authentication Bypass in Azure AI Face Service by Microsoft,"The Azure AI Face Service is vulnerable to an authentication bypass which can be exploited through spoofing techniques. When successfully executed, this vulnerability allows an authorized attacker to elevate their privileges over a network, potentially leading to unauthorized access to sensitive resources and data. Organizations utilizing Azure AI Face Service should review their security measures and apply any available updates or patches to mitigate risks associated with this vulnerability.",Microsoft,Azure Ai Face Service,9.9,CRITICAL,0.0006900000153109431,false,,true,false,true,2025-02-04T08:17:36.000Z,false,false,false,,2025-01-29T22:42:01.411Z,1173 CVE-2025-21399,https://securityvulnerability.io/vulnerability/CVE-2025-21399,Elevation of Privilege Vulnerability in Microsoft Edge (Chromium-based),"A vulnerability in the update mechanism of Microsoft Edge (Chromium-based) allows an attacker to exploit this flaw to gain elevated privileges on the affected system. If successfully executed, this may enable unauthorized actions to be performed by the attacker, potentially compromising user data and system integrity. Users are encouraged to regularly update their browser and apply security patches to mitigate risks associated with this vulnerability.",Microsoft,Microsoft Edge Update Setup,7.4,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-17T19:19:49.839Z,0 CVE-2025-21325,https://securityvulnerability.io/vulnerability/CVE-2025-21325,Windows Secure Kernel Mode Elevation of Privilege Vulnerability in Microsoft Products,"This vulnerability in Windows allows malicious actors to gain elevated privileges in Secure Kernel Mode, which could enable them to execute arbitrary code and compromise system integrity. It impacts several Windows versions, underscoring the importance of timely security updates and robust security practices to mitigate potential exploitation.",Microsoft,"Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows 11 Version 24h2,Windows Server 2025",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-17T01:15:00.000Z,468 CVE-2025-21245,https://securityvulnerability.io/vulnerability/CVE-2025-21245,Remote Code Execution Vulnerability in Windows Telephony Service by Microsoft,"The Windows Telephony Service is susceptible to a remote code execution vulnerability, which may allow an attacker to execute arbitrary code through crafted requests. This vulnerability could potentially compromise the integrity and confidentiality of the system, making it critical for users to apply the necessary updates to safeguard their systems against potential exploit attempts.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,false,,2025-01-14T18:04:56.174Z,0 CVE-2025-21409,https://securityvulnerability.io/vulnerability/CVE-2025-21409,Windows Telephony Service Remote Code Execution Vulnerability in Microsoft Products,"The Windows Telephony Service is susceptible to a remote code execution vulnerability, which could allow an attacker to execute arbitrary code on the affected system. This risk occurs when the service improperly handles certain requests, potentially allowing unauthorized access to system functionality. Users are encouraged to review Microsoft’s advisory and apply any available patches to mitigate this threat.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0013299999991431832,false,,false,false,false,,false,false,false,,2025-01-14T18:04:55.685Z,0 CVE-2025-21223,https://securityvulnerability.io/vulnerability/CVE-2025-21223,Remote Code Execution Vulnerability in Windows Telephony Service by Microsoft,"A vulnerability has been identified in the Windows Telephony Service, allowing an attacker to execute arbitrary code on a vulnerable system. This remote code execution flaw can be exploited by sending specially crafted requests to the affected service. If successfully exploited, it could enable an attacker to gain elevated privileges, potentially compromising the confidentiality, integrity, and availability of the affected system. Organizations are advised to apply relevant patches and updates to mitigate the risk.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,false,,2025-01-14T18:04:55.055Z,0 CVE-2025-21238,https://securityvulnerability.io/vulnerability/CVE-2025-21238,Remote Code Execution Vulnerability in Windows Telephony Service by Microsoft,"The vulnerability in the Windows Telephony Service could allow an attacker to execute arbitrary code on a targeted system. This could be exploited by specially crafted requests sent to the service, potentially leading to system compromise. Users and administrators are advised to apply the latest security updates to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,false,,2025-01-14T18:04:54.493Z,0 CVE-2025-21240,https://securityvulnerability.io/vulnerability/CVE-2025-21240,Remote Code Execution Vulnerability in Windows Telephony Service by Microsoft,"The vulnerability in the Windows Telephony Service allows for remote code execution that can be exploited by an attacker. Successful exploitation could lead to unauthorized execution of commands or malware installation without user interaction. This can significantly compromise the confidentiality, integrity, and availability of affected systems. It is crucial for users to apply the latest security updates to mitigate any potential risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,false,,2025-01-14T18:04:53.937Z,0 CVE-2025-21250,https://securityvulnerability.io/vulnerability/CVE-2025-21250,Remote Code Execution Vulnerability in Windows Telephony Service by Microsoft,"The vulnerability in the Windows Telephony Service allows remote code execution due to the improper handling of specific requests. An attacker exploiting this flaw could run arbitrary code with system privileges, potentially leading to a complete compromise of the affected system. Users and administrators should apply updates and security patches to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,false,,2025-01-14T18:04:53.400Z,0 CVE-2025-21417,https://securityvulnerability.io/vulnerability/CVE-2025-21417,Remote Code Execution Vulnerability in Windows Telephony Service,"The Windows Telephony Service includes a critical vulnerability that allows an attacker to execute arbitrary code on affected systems. By exploiting this vulnerability, a malicious actor could potentially gain elevated privileges and perform unauthorized actions, thus compromising the security and integrity of the affected systems. Users of Windows 10, Windows 11, Windows Server 2019, and Windows Server 2022 should ensure their systems are updated to mitigate the risks associated with this vulnerability.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0013299999991431832,false,,false,false,false,,false,false,false,,2025-01-14T18:04:52.868Z,0 CVE-2025-21246,https://securityvulnerability.io/vulnerability/CVE-2025-21246,Remote Code Execution Vulnerability in Windows Telephony Service,"A vulnerability in the Windows Telephony Service allows remote attackers to execute arbitrary code on affected installations. This issue arises due to improper validation of user input. Successful exploitation could lead to unauthorized actions on the system, making it imperative for organizations to apply relevant patches to safeguard their infrastructure.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,false,,2025-01-14T18:04:52.279Z,0 CVE-2025-21334,https://securityvulnerability.io/vulnerability/CVE-2025-21334,Elevated Privilege Vulnerability in Windows Hyper-V by Microsoft,"A vulnerability exists in the Windows Hyper-V integration components that allows an attacker to elevate their privileges. By exploiting this issue, a malicious user could gain increased access to the system, potentially leading to unauthorized tasks or executing harmful applications. Microsoft has released a detailed advisory on this vulnerability, encouraging users to apply patches and updates to mitigate the risks associated with it.",Microsoft,"Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025",7.8,HIGH,0.0009800000116229057,true,2025-01-14T00:00:00.000Z,false,false,true,2025-01-14T00:00:00.000Z,false,false,false,,2025-01-14T18:04:51.608Z,0 CVE-2025-21333,https://securityvulnerability.io/vulnerability/CVE-2025-21333,Elevated Privilege Exposure in Windows Hyper-V by Microsoft,"A vulnerability has been identified in Windows Hyper-V, specifically related to the NT Kernel Integration Virtual Service Provider (VSP). This flaw allows an attacker to gain elevated privileges through carefully crafted input, potentially leading to unauthorized access and control over the host system. Users of Windows Hyper-V on various Windows platforms should prioritize applying security updates to mitigate risks associated with this vulnerability. For more details, visit the Microsoft Security Response Center.",Microsoft,"Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025",7.8,HIGH,0.0005099999834783375,true,2025-01-14T00:00:00.000Z,false,false,true,2025-01-14T00:00:00.000Z,false,true,false,,2025-01-14T18:04:50.962Z,5087 CVE-2025-21311,https://securityvulnerability.io/vulnerability/CVE-2025-21311,Windows NTLM V1 Elevation of Privilege Vulnerability Affecting Microsoft Products,"The Windows NTLM V1 Elevation of Privilege Vulnerability enables attackers to increase their user privileges within the affected systems. Exploiting this vulnerability could allow unauthorized users to gain access to sensitive resources and potentially compromise system integrity. This vulnerability poses significant risks, particularly in environments where NTLM authentication is employed. Organizations are urged to assess their systems and implement recommended mitigations to safeguard against exploitation.",Microsoft,"Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025",9.8,CRITICAL,0.0014299999456852674,false,,false,false,false,,false,false,false,,2025-01-14T18:04:50.416Z,0 CVE-2025-21326,https://securityvulnerability.io/vulnerability/CVE-2025-21326,Remote Code Execution Vulnerability in Internet Explorer by Microsoft,"This vulnerability in Internet Explorer allows an attacker to execute arbitrary code on a user’s system. By exploiting this flaw, a malicious entity can gain unauthorized access to the affected system, potentially compromising sensitive data and leading to further exploitation. Users are urged to apply security updates to mitigate risks associated with this vulnerability, which is particularly concerning given the extensive use of Internet Explorer across various platforms.",Microsoft,"Windows Server 2025,Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation)",7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,false,,2025-01-14T18:04:49.769Z,0 CVE-2025-21218,https://securityvulnerability.io/vulnerability/CVE-2025-21218,Windows Kerberos Denial of Service Vulnerability in Microsoft Products,"A significant vulnerability has been identified in the Windows Kerberos authentication system, which could lead to a Denial of Service. This flaw may allow an attacker to disrupt the normal operations of the Kerberos protocol, causing affected systems to become unresponsive. Organizations using Microsoft products, particularly those running specific versions of Windows Server and Windows, should take immediate action to assess their security posture and implement recommended patches to mitigate potential risks.",Microsoft,"Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows Server 2025,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.5,HIGH,0.0006300000241026282,false,,false,false,false,,false,false,false,,2025-01-14T18:04:46.931Z,0 CVE-2025-21402,https://securityvulnerability.io/vulnerability/CVE-2025-21402,Remote Code Execution Vulnerability in Microsoft Office OneNote,"A vulnerability exists in Microsoft Office OneNote that could allow an attacker to execute arbitrary code on the user's machine. By crafting a malicious file and enticing a user to open it, an attacker could take control of the affected system. Users are advised to apply security updates promptly to mitigate the risk associated with this vulnerability.",Microsoft,"Microsoft Office Ltsc For Mac 2021,Microsoft Office Ltsc For Mac 2024,Microsoft Onenote",7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,false,,2025-01-14T18:04:46.460Z,0 CVE-2025-21378,https://securityvulnerability.io/vulnerability/CVE-2025-21378,Windows CSC Service Elevation of Privilege Vulnerability in Microsoft Products,"A vulnerability has been identified in the Windows CSC service that could allow an authenticated attacker to elevate their privileges on vulnerable systems. By exploiting this flaw, an attacker could potentially gain higher-level access and execute arbitrary actions within the system, posing a significant threat to the integrity and security of the affected environments. Users and administrators are advised to apply the latest security updates and closely monitor their systems for any suspicious activities.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0004799999878741801,false,,false,false,false,,false,false,false,,2025-01-14T18:04:45.919Z,0 CVE-2025-21372,https://securityvulnerability.io/vulnerability/CVE-2025-21372,Brokering File System Elevation of Privilege Vulnerability in Microsoft Products,"This vulnerability affects Microsoft's Brokering File System, allowing an attacker with limited access to elevate their privileges on the system. Successful exploitation could enable unauthorized access to sensitive data or functions that should be restricted. It is essential for users and administrators to apply the recommended security updates to mitigate the risks associated with this vulnerability.",Microsoft,"Windows Server 2025 (server Core Installation),Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025",7.8,HIGH,0.000590000010561198,false,,false,false,false,,false,false,false,,2025-01-14T18:04:44.826Z,0 CVE-2025-21370,https://securityvulnerability.io/vulnerability/CVE-2025-21370,Windows Virtualization-Based Security Enclave Elevation of Privilege Vulnerability in Microsoft Products,A vulnerability exists in the Windows Virtualization-Based Security (VBS) that allows an attacker to elevate privileges within an enclave. Successful exploitation could allow a malicious actor to gain access to restricted resources. This vulnerability highlights the importance of securing virtualized environments and maintaining updated security practices to mitigate potential risks.,Microsoft,"Windows 11 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows 11 Version 24h2",7.8,HIGH,0.0004799999878741801,false,,false,false,false,,false,false,false,,2025-01-14T18:04:44.204Z,0 CVE-2025-21361,https://securityvulnerability.io/vulnerability/CVE-2025-21361,Remote Code Execution Vulnerability in Microsoft Outlook,A vulnerability in Microsoft Outlook may allow an attacker to execute arbitrary code on the affected system. Exploitation of this issue requires that a user open a specially crafted email or view a malicious HTML email in the Outlook client. Successful exploitation can result in the attacker gaining the same user privileges as the logged-on user. It is crucial for users to apply suggested patches and updates to mitigate the risk associated with this vulnerability.,Microsoft,"Microsoft Office Ltsc For Mac 2021,Microsoft Outlook For Mac,Microsoft Office Ltsc For Mac 2024",7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,false,,2025-01-14T18:04:43.571Z,0 CVE-2025-21360,https://securityvulnerability.io/vulnerability/CVE-2025-21360,Elevation of Privilege Vulnerability in Microsoft AutoUpdate,"The vulnerability in Microsoft AutoUpdate allows attackers to exploit the software to gain elevated privileges on the system. This can lead to unauthorized access and manipulation of files or settings, posing serious security risks for users. Quick remediation and system updates are essential to mitigate potential attacks leveraging this vulnerability.",Microsoft,Microsoft Autoupdate For Mac,7.8,HIGH,0.0005200000014156103,false,,false,false,false,,false,false,false,,2025-01-14T18:04:42.952Z,0 CVE-2025-21343,https://securityvulnerability.io/vulnerability/CVE-2025-21343,Information Disclosure Vulnerability in Windows Web Threat Defense by Microsoft,"The vulnerability in Windows Web Threat Defense allows an attacker to gain unauthorized access to sensitive information via the User Service. This can lead to potential exposure of critical data, making it essential for users and administrators to mitigate risks by applying security updates and monitoring their systems closely.",Microsoft,"Windows 11 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows 11 Version 24h2",7.5,HIGH,0.0015800000401213765,false,,false,false,false,,false,false,false,,2025-01-14T18:04:42.381Z,0 CVE-2025-21339,https://securityvulnerability.io/vulnerability/CVE-2025-21339,Remote Code Execution Vulnerability in Windows Telephony Service by Microsoft,"The vulnerability in the Windows Telephony Service allows remote attackers to execute arbitrary code on affected systems. By sending specially crafted requests, an attacker can exploit this flaw to gain unauthorized access and control over system resources, potentially leading to further exploitation or data compromise.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",8.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,false,,2025-01-14T18:04:41.257Z,0