Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,234

Total CVEs

1,589

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1599
MEDIUM 7
INFO 620

Showing 20 of 428 CVEs matching "Microsoft" · HIGH

CVE-2025-21391KEV
High

Microsoft Windows Storage contains a link following vulnerability that could allow for privilege escalation. This vulnerability could allow an attacker to delete data including data that results in the service being unavailable.

MicrosoftEPSS 2.5%
CVE-2025-21418KEV
High

Microsoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.

MicrosoftEPSS 9.5%
CVE-2025-0994KEV
High

Trimble Cityworks contains a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer's Microsoft Internet Information Services (IIS) web server.

TrimbleEPSS 77.8%
CVE-2024-21413KEV
High

Microsoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.

MicrosoftEPSS 93.3%
CVE-2024-29059KEV
High

Microsoft .NET Framework contains an information disclosure vulnerability that exposes the ObjRef URI to an attacker, ultimately enabling remote code execution.

MicrosoftEPSS 93.8%
CVE-2025-21335KEV
High

Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.

MicrosoftEPSS 8.7%
CVE-2025-21333KEV
High

Microsoft Windows Hyper-V NT Kernel Integration VSP contains a heap-based buffer overflow vulnerability that allows a local attacker to gain SYSTEM privileges.

MicrosoftEPSS 80.7%
CVE-2025-21334KEV
High

Microsoft Windows Hyper-V NT Kernel Integration VSP contains a use-after-free vulnerability that allows a local attacker to gain SYSTEM privileges.

MicrosoftEPSS 6.6%
CVE-2024-35250KEV
High

Microsoft Windows Kernel-Mode Driver contains an untrusted pointer dereference vulnerability that allows a local attacker to escalate privileges.

MicrosoftEPSS 53.7%
CVE-2024-49138KEV
High

Microsoft Windows Common Log File System (CLFS) driver contains a heap-based buffer overflow vulnerability that allows a local attacker to escalate privileges.

MicrosoftEPSS 84.5%
CVE-2024-49039KEV
High

Microsoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions.

MicrosoftEPSS 65.9%
CVE-2024-43451KEV
High

Microsoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user.

MicrosoftEPSS 90.3%
CVE-2024-38094KEV
High

Microsoft SharePoint contains a deserialization vulnerability that allows for remote code execution.

MicrosoftEPSS 64.3%
CVE-2024-30088KEV
High

Microsoft Windows Kernel contains a time-of-check to time-of-use (TOCTOU) race condition vulnerability that could allow for privilege escalation.

MicrosoftEPSS 85.2%
CVE-2024-43573KEV
High

Microsoft Windows MSHTML Platform contains an unspecified spoofing vulnerability which can lead to a loss of confidentiality.

MicrosoftEPSS 18.6%
CVE-2024-43572KEV
High

Microsoft Windows Management Console contains unspecified vulnerability that allows for remote code execution.

MicrosoftEPSS 44.6%
CVE-2020-0618KEV
High

Microsoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly. An authenticated attacker can exploit this vulnerability to execute code in the context of the Report Server service account.

MicrosoftEPSS 94.3%
CVE-2024-43461KEV
High

Microsoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to spoof a web page. This vulnerability was exploited in conjunction with CVE-2024-38112.

MicrosoftEPSS 9.8%
CVE-2024-38217KEV
High

Microsoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.

MicrosoftEPSS 13.2%
CVE-2024-38226KEV
High

Microsoft Publisher contains a protection mechanism failure vulnerability that allows attacker to bypass Office macro policies used to block untrusted or malicious files.

MicrosoftEPSS 1.4%