Vulnerabilities
Vulnerable Software
Security Vulnerabilities - Known exploited
CVE-2025-24993
Known exploited
Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.
CVSS Score
7.8
EPSS Score
0.034
Published
2025-03-11
CVE-2025-24984
Known exploited
Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.
CVSS Score
4.6
EPSS Score
0.213
Published
2025-03-11
CVE-2025-24985
Known exploited
Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
CVSS Score
7.8
EPSS Score
0.015
Published
2025-03-11
CVE-2025-24983
Known exploited
Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.
CVSS Score
7.0
EPSS Score
0.019
Published
2025-03-11
CVE-2025-24054
Known exploited
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
CVSS Score
6.5
EPSS Score
0.368
Published
2025-03-11
CVE-2025-27363
Known exploited
An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.
CVSS Score
8.1
EPSS Score
0.755
Published
2025-03-11
CVE-2025-24813
Known exploited
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
CVSS Score
9.8
EPSS Score
0.937
Published
2025-03-10
CVE-2025-1316
Known exploited
Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device
CVSS Score
9.8
EPSS Score
0.733
Published
2025-03-05
CVE-2025-22224
Known exploited
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
CVSS Score
9.3
EPSS Score
0.525
Published
2025-03-04
CVE-2025-22225
Known exploited
VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
CVSS Score
8.2
EPSS Score
0.103
Published
2025-03-04


Contact Us

Shodan ® - All rights reserved