Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2025-01-14 | CVE-2025-21271 | Unspecified vulnerability in Microsoft products Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | 7.8 |
2025-01-14 | CVE-2025-21297 | Unspecified vulnerability in Microsoft products Windows Remote Desktop Services Remote Code Execution Vulnerability | 8.1 |
2025-01-14 | CVE-2025-21299 | Unspecified vulnerability in Microsoft products Windows Kerberos Security Feature Bypass Vulnerability | 7.8 |
2025-01-14 | CVE-2025-21304 | Unspecified vulnerability in Microsoft products Microsoft DWM Core Library Elevation of Privilege Vulnerability | 7.8 |
2025-01-14 | CVE-2025-21309 | Unspecified vulnerability in Microsoft products Windows Remote Desktop Services Remote Code Execution Vulnerability | 8.1 |
2025-01-14 | CVE-2025-21315 | Unspecified vulnerability in Microsoft products Microsoft Brokering File System Elevation of Privilege Vulnerability | 7.8 |
2025-01-14 | CVE-2025-21326 | Unspecified vulnerability in Microsoft Windows Server 2022 23H2 and Windows Server 2025 Internet Explorer Remote Code Execution Vulnerability | 7.8 |
2025-01-14 | CVE-2025-21332 | Unspecified vulnerability in Microsoft products MapUrlToZone Security Feature Bypass Vulnerability | 8.8 |
2025-01-14 | CVE-2024-13180 | Path Traversal vulnerability in Ivanti Avalanche Path Traversal in Ivanti Avalanche before version 6.4.7 allows a remote unauthenticated attacker to leak sensitive information. | 7.5 |
2025-01-14 | CVE-2023-37937 | OS Command Injection vulnerability in Fortinet Fortiswitch An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via the FortiSwitch CLI. | 7.8 |