Search and browse vulnerability records from NVD
Showing 50 of 825 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2025-6558
KEV
|
8.8 HIGH |
Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
0.2% | 2025-07-15 | |
|
CVE-2025-48384
KEV
|
8.0 HIGH |
Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1. |
0.5% | 2025-07-08 | |
|
CVE-2025-49704
KEV
|
8.8 HIGH |
Improper control of generation of code ('code injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
61.4% | 2025-07-08 | |
|
CVE-2025-6554
KEV
|
8.1 HIGH |
Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) |
0.7% | 2025-06-30 | |
|
CVE-2025-6218
KEV
|
7.8 HIGH |
RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198. |
4.8% | 2025-06-21 | |
|
CVE-2025-5777
KEV
|
7.5 HIGH |
Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server |
69.8% | 2025-06-17 | |
|
CVE-2025-33073
KEV
|
8.8 HIGH |
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network. |
54.9% | 2025-06-10 | |
|
CVE-2025-33053
KEV
|
8.8 HIGH |
External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network. |
51.8% | 2025-06-10 | |
|
CVE-2025-21479
KEV
|
8.6 HIGH |
Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands. |
0.1% | 2025-06-03 | |
|
CVE-2025-27038
KEV
|
7.5 HIGH |
Memory corruption while rendering graphics using Adreno GPU drivers in Chrome. |
1.1% | 2025-06-03 | |
|
CVE-2025-21480
KEV
|
8.6 HIGH |
Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands. |
1.5% | 2025-06-03 | |
|
CVE-2025-5419
KEV
|
8.8 HIGH |
Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
3.0% | 2025-06-03 | |
|
CVE-2025-34026
KEV
|
7.5 HIGH |
The Versa Concerto SD-WAN orchestration platform is vulnerable to an authentication bypass in the Traefik reverse proxy configuration, allowing at attacker to access administrative endpoints. The internal Actuator endpoint can be leveraged for access to heap dumps and trace logs.This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable. |
62.4% | 2025-05-21 | |
|
CVE-2025-4008
KEV
|
8.8 HIGH |
The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C. This web interface exposes an endpoint that is vulnerable to command injection. Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices. |
45.9% | 2025-05-21 | |
|
CVE-2025-32709
KEV
|
7.8 HIGH |
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
1.0% | 2025-05-13 | |
|
CVE-2025-32706
KEV
|
7.8 HIGH |
Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
1.3% | 2025-05-13 | |
|
CVE-2025-32701
KEV
|
7.8 HIGH |
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
2.1% | 2025-05-13 | |
|
CVE-2025-30400
KEV
|
7.8 HIGH |
Use after free in Windows DWM allows an authorized attacker to elevate privileges locally. |
1.0% | 2025-05-13 | |
|
CVE-2025-30397
KEV
|
7.5 HIGH |
Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network. |
21.3% | 2025-05-13 | |
|
CVE-2025-4428
KEV
|
7.2 HIGH |
Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests. |
43.4% | 2025-05-13 | |
|
CVE-2025-27920
KEV
|
7.2 HIGH |
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access. |
52.0% | 2025-05-05 | |
|
CVE-2025-3935
KEV
|
8.1 HIGH |
ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys. It is important to note that to obtain these machine keys, privileged system level access must be obtained. If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server. The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior. This had no direct impact to ScreenConnect Client. ScreenConnect 2025.4 patch disables ViewState and removes any dependency on it. |
15.5% | 2025-04-25 | |
|
CVE-2025-3928
KEV
|
8.8 HIGH |
Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms. This vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) Catalog on 2025-04-28. |
18.1% | 2025-04-25 | |
|
CVE-2025-29824
KEV
|
7.8 HIGH |
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
0.5% | 2025-04-08 | |
|
CVE-2025-2783
KEV
|
8.3 HIGH |
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High) |
36.3% | 2025-03-26 | |
|
CVE-2025-30154
KEV
|
8.6 HIGH |
reviewdog/action-setup is a GitHub action that installs reviewdog. reviewdog/action-setup@v1 was compromised March 11, 2025, between 18:42 and 20:31 UTC, with malicious code added that dumps exposed secrets to Github Actions Workflow Logs. Other reviewdog actions that use `reviewdog/action-setup@v1` that would also be compromised, regardless of version or pinning method, are reviewdog/action-shellcheck, reviewdog/action-composite-template, reviewdog/action-staticcheck, reviewdog/action-ast-grep, and reviewdog/action-typos. |
15.4% | 2025-03-19 | |
|
CVE-2025-30066
KEV
|
8.6 HIGH |
tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.) |
90.4% | 2025-03-15 | |
|
CVE-2025-26633
KEV
|
7.0 HIGH |
Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally. |
7.8% | 2025-03-11 | |
|
CVE-2025-24993
KEV
|
7.8 HIGH |
Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally. |
1.5% | 2025-03-11 | |
|
CVE-2025-24985
KEV
|
7.8 HIGH |
Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally. |
1.1% | 2025-03-11 | |
|
CVE-2025-24983
KEV
|
7.0 HIGH |
Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally. |
0.7% | 2025-03-11 | |
|
CVE-2025-27363
KEV
|
8.1 HIGH |
An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild. |
76.2% | 2025-03-11 | |
|
CVE-2025-22226
KEV
|
7.1 HIGH |
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process. |
6.8% | 2025-03-04 | |
|
CVE-2025-22225
KEV
|
8.2 HIGH |
VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox. |
6.1% | 2025-03-04 | |
|
CVE-2024-48248
KEV
|
8.6 HIGH |
NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials). |
94.0% | 2025-03-04 | |
|
CVE-2025-24989
KEV
|
8.2 HIGH |
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you. |
25.7% | 2025-02-19 | |
|
CVE-2025-21418
KEV
|
7.8 HIGH |
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
9.5% | 2025-02-11 | |
|
CVE-2025-21391
KEV
|
7.1 HIGH |
Windows Storage Elevation of Privilege Vulnerability |
2.5% | 2025-02-11 | |
|
CVE-2025-24472
KEV
|
8.1 HIGH |
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote unauthenticated attacker with prior knowledge of upstream and downstream devices serial numbers to gain super-admin privileges on the downstream device, if the Security Fabric is enabled, via crafted CSF proxy requests. |
5.9% | 2025-02-11 | |
|
CVE-2025-0994
KEV
|
8.8 HIGH |
Trimble Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10 are vulnerable to a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer’s Microsoft Internet Information Services (IIS) web server. |
75.8% | 2025-02-06 | |
|
CVE-2024-40891
KEV
|
8.8 HIGH |
**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet. |
55.4% | 2025-02-04 | |
|
CVE-2024-40890
KEV
|
8.8 HIGH |
**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request. |
45.9% | 2025-02-04 | |
|
CVE-2023-52163
KEV
|
8.8 HIGH |
Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
74.7% | 2025-02-03 | |
|
CVE-2025-0411
KEV
|
7.0 HIGH |
7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456. |
52.4% | 2025-01-25 | |
|
CVE-2025-23209
KEV
|
8.0 HIGH |
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue. |
19.1% | 2025-01-18 | |
|
CVE-2024-57727
KEV
|
7.5 HIGH |
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords. |
93.7% | 2025-01-15 | |
|
CVE-2025-21335
KEV
|
7.8 HIGH |
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability |
8.7% | 2025-01-14 | |
|
CVE-2025-21334
KEV
|
7.8 HIGH |
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability |
6.6% | 2025-01-14 | |
|
CVE-2025-21333
KEV
|
7.8 HIGH |
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability |
80.7% | 2025-01-14 | |
|
CVE-2024-12987
KEV
|
7.3 HIGH |
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. |
79.5% | 2024-12-27 |