Vulnerabilities
Vulnerable Software
Security Vulnerabilities - CVEs Published In April 2025
Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
CVSS Score
8.1
EPSS Score
0.005
Published
2025-04-08
Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
CVSS Score
7.8
EPSS Score
0.007
Published
2025-04-08
Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature over a network.
CVSS Score
5.4
EPSS Score
0.029
Published
2025-04-08
Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.
CVSS Score
7.5
EPSS Score
0.424
Published
2025-04-08
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
CVSS Score
6.5
EPSS Score
0.041
Published
2025-04-08
Sensitive data storage in improperly locked memory in Windows Update Stack allows an authorized attacker to elevate privileges locally.
CVSS Score
7.0
EPSS Score
0.002
Published
2025-04-08
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
CVSS Score
7.8
EPSS Score
0.007
Published
2025-04-08
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
CVSS Score
8.8
EPSS Score
0.035
Published
2025-04-08
After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVSS Score
5.5
EPSS Score
0.003
Published
2025-04-08
Adobe Experience Manager Screens versions FP11.3 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. Exploitation of this issue requires user interaction in that a victim must open a malicious link.
CVSS Score
5.4
EPSS Score
0.002
Published
2025-04-08


Contact Us

Shodan ® - All rights reserved