Search and browse vulnerability records from NVD
Showing 50 of 1587 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2025-24984
KEV
|
4.6 MEDIUM |
Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack. |
2.8% | 2025-03-11 | |
|
CVE-2025-24983
KEV
|
7.0 HIGH |
Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally. |
1.5% | 2025-03-11 | |
|
CVE-2025-24054
KEV
|
6.5 MEDIUM |
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network. |
7.8% | 2025-03-11 | |
|
CVE-2025-27363
KEV
|
8.1 HIGH |
An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild. |
69.2% | 2025-03-11 | |
|
CVE-2024-54085
KEV
|
9.8 CRITICAL |
AMIās SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability. |
43.0% | 2025-03-11 | |
|
CVE-2025-24813
KEV
|
9.8 CRITICAL |
Path Equivalence: 'file.Name' (Internal Dot) leading toĀ Remote Code Execution and/or Information disclosureĀ and/or malicious content added to uploaded files via write enabledĀ Default ServletĀ in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: -Ā writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory ofĀ a target URL for public uploads -Ā attacker knowledge of the names of security sensitive files beingĀ uploaded -Ā the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) -Ā support for partial PUT (enabled by default) -Ā application was using Tomcat's file based session persistence with theĀ default storage location -Ā application included a library that may be leveraged in aĀ deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue. |
94.1% | 2025-03-10 | |
|
CVE-2025-1316
KEV
|
9.8 CRITICAL |
Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device |
86.5% | 2025-03-05 | |
|
CVE-2025-22226
KEV
|
7.1 HIGH |
VMware ESXi, Workstation, and Fusion containĀ an information disclosure vulnerability due to an out-of-bounds read in HGFS.Ā A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process. |
4.3% | 2025-03-04 | |
|
CVE-2025-22225
KEV
|
8.2 HIGH |
VMware ESXi contains an arbitrary writeĀ vulnerability.Ā A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox. |
10.0% | 2025-03-04 | |
|
CVE-2025-22224
KEV
|
9.3 CRITICAL |
VMware ESXi, and WorkstationĀ contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.Ā A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. |
47.3% | 2025-03-04 | |
|
CVE-2024-48248
KEV
|
8.6 HIGH |
NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials). |
94.0% | 2025-03-04 | |
|
CVE-2025-24893
KEV
|
9.8 CRITICAL |
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any guest can perform arbitrary remote code execution through a request to `SolrSearch`. This impacts the confidentiality, integrity and availability of the whole XWiki installation. To reproduce on an instance, without being logged in, go to `<host>/xwiki/bin/get/Main/SolrSearch?media=rss&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28"Hello%20from"%20%2B%20"%20search%20text%3A"%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20`. If there is an output, and the title of the RSS feed contains `Hello from search text:42`, then the instance is vulnerable. This vulnerability has been patched in XWiki 15.10.11, 16.4.1 and 16.5.0RC1. Users are advised to upgrade. Users unable to upgrade may edit `Main.SolrSearchMacros` in `SolrSearchMacros.xml` on line 955 to match the `rawResponse` macro in `macros.vm#L2824` with a content type of `application/xml`, instead of simply outputting the content of the feed. |
93.7% | 2025-02-20 | |
|
CVE-2025-24989
KEV
|
8.2 HIGH |
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you. |
31.6% | 2025-02-19 | |
|
CVE-2025-0111
KEV
|
6.5 MEDIUM |
An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the ānobodyā user. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software. |
3.7% | 2025-02-12 | |
|
CVE-2025-0108
KEV
|
9.1 CRITICAL |
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software. |
94.1% | 2025-02-12 | |
|
CVE-2025-21418
KEV
|
7.8 HIGH |
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
13.3% | 2025-02-11 | |
|
CVE-2025-21391
KEV
|
7.1 HIGH |
Windows Storage Elevation of Privilege Vulnerability |
4.7% | 2025-02-11 | |
|
CVE-2025-24472
KEV
|
8.1 HIGH |
AnĀ Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote unauthenticated attacker with prior knowledge of upstream and downstream devices serial numbers to gain super-admin privileges on the downstream device, if the Security Fabric is enabled, via crafted CSF proxy requests. |
10.4% | 2025-02-11 | |
|
CVE-2025-24016
KEV
|
9.9 CRITICAL |
Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject an unsanitized dictionary in DAPI request/response, they can forge an unhandled exception (`__unhandled_exc__`) to evaluate arbitrary python code. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent. Version 4.9.1 contains a fix. |
93.5% | 2025-02-10 | |
|
CVE-2025-24200
KEV
|
6.1 MEDIUM |
An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.1 and iPadOS 18.3.1, iPadOS 17.7.5. A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. |
48.2% | 2025-02-10 | |
|
CVE-2025-0994
KEV
|
8.8 HIGH |
Trimble Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10 are vulnerable to a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customerās Microsoft Internet Information Services (IIS) web server. |
74.9% | 2025-02-06 | |
|
CVE-2024-40891
KEV
|
8.8 HIGH |
**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware versionĀ 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commandsĀ on an affected device via Telnet. |
53.2% | 2025-02-04 | |
|
CVE-2024-40890
KEV
|
8.8 HIGH |
**UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request. |
45.9% | 2025-02-04 | |
|
CVE-2023-52163
KEV
|
8.8 HIGH |
Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
71.8% | 2025-02-03 | |
|
CVE-2025-25181
KEV
|
5.8 MEDIUM |
A SQL injection vulnerability in timeoutWarning.asp in Advantive VeraCore through 2025.1.0 allows remote attackers to execute arbitrary SQL commands via the PmSess1 parameter. |
72.1% | 2025-02-03 | |
|
CVE-2024-57968
KEV
|
9.9 CRITICAL |
Advantive VeraCore before 2024.4.2.1 allows remote authenticated users to upload files to unintended folders (e.g., ones that are accessible during web browsing by other users). upload.aspx can be used for this. |
43.7% | 2025-02-03 | |
|
CVE-2025-24085
KEV
|
10.0 CRITICAL |
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.3 and iPadOS 18.3, iPadOS 17.7.6, macOS Sequoia 15.3, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.3, visionOS 2.3, watchOS 11.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2. |
15.9% | 2025-01-27 | |
|
CVE-2025-0411
KEV
|
7.0 HIGH |
7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456. |
52.4% | 2025-01-25 | |
|
CVE-2025-23006
KEV
|
9.8 CRITICAL |
Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands. |
56.6% | 2025-01-23 | |
|
CVE-2025-23209
KEV
|
8.0 HIGH |
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue. |
18.4% | 2025-01-18 | |
|
CVE-2024-57728
KEV
|
7.2 HIGH |
SimpleHelp remote support software v5.5.7 and before allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. |
59.3% | 2025-01-15 | |
|
CVE-2024-57727
KEV
|
7.5 HIGH |
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords. |
94.0% | 2025-01-15 | |
|
CVE-2024-57726
KEV
|
9.9 CRITICAL |
SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role. |
49.2% | 2025-01-15 | |
|
CVE-2025-21335
KEV
|
7.8 HIGH |
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability |
8.7% | 2025-01-14 | |
|
CVE-2025-21334
KEV
|
7.8 HIGH |
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability |
6.6% | 2025-01-14 | |
|
CVE-2025-21333
KEV
|
7.8 HIGH |
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability |
82.3% | 2025-01-14 | |
|
CVE-2024-13161
KEV
|
9.8 CRITICAL |
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information. |
92.4% | 2025-01-14 | |
|
CVE-2024-13160
KEV
|
9.8 CRITICAL |
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information. |
93.4% | 2025-01-14 | |
|
CVE-2024-13159
KEV
|
9.8 CRITICAL |
Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information. |
94.2% | 2025-01-14 | |
|
CVE-2024-55591
KEV
|
9.8 CRITICAL |
AnĀ Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests toĀ Node.js websocket module. |
94.1% | 2025-01-14 | |
|
CVE-2024-53704
KEV
|
9.8 CRITICAL |
An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication. |
93.9% | 2025-01-09 | |
|
CVE-2025-0282
KEV
|
9.0 CRITICAL |
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution. |
94.1% | 2025-01-08 | |
|
CVE-2024-50603
KEV
|
10.0 CRITICAL |
An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test. |
94.4% | 2025-01-08 | |
|
CVE-2024-12987
KEV
|
7.3 HIGH |
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. |
79.0% | 2024-12-27 | |
|
CVE-2024-53197
KEV
|
7.8 HIGH |
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configuration. |
1.8% | 2024-12-27 | |
|
CVE-2024-3393
KEV
|
7.5 HIGH |
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode. |
77.7% | 2024-12-27 | |
|
CVE-2024-53150
KEV
|
7.1 HIGH |
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For addressing it, this patch adds sanity checks to the validator functions for the clock descriptor traversal. When the descriptor length is shorter than expected, it's skipped in the loop. For the clock source and clock multiplier descriptors, we can just check bLength against the sizeof() of each descriptor type. OTOH, the clock selector descriptor of UAC2 and UAC3 has an array of bNrInPins elements and two more fields at its tail, hence those have to be checked in addition to the sizeof() check. |
1.1% | 2024-12-24 | |
|
CVE-2024-56145
KEV
|
9.8 CRITICAL |
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should disable `register_argc_argv` to mitigate the issue. |
94.1% | 2024-12-18 | |
|
CVE-2024-12686
KEV
|
6.6 MEDIUM |
A vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) which can allow an attacker with existing administrative privileges to inject commands and run as a site user. |
31.5% | 2024-12-18 | |
|
CVE-2024-12356
KEV
|
9.8 CRITICAL |
A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow an unauthenticated attacker to inject commands that are run as a site user. |
93.9% | 2024-12-17 |