Total 277570 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-13164 2025-01-15 7.8 High
An uninitialized resource in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a local authenticated attacker to escalate their privileges.
CVE-2025-23051 2025-01-15 7.2 High
An authenticated parameter injection vulnerability exists in the web-based management interface of the AOS-8 and AOS-10 Operating Systems. Successful exploitation could allow an authenticated user to leverage parameter injection to overwrite arbitrary system files.
CVE-2024-12085 1 Redhat 2 Enterprise Linux, Openshift 2025-01-15 7.5 High
A flaw was found in the rsync daemon which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.
CVE-2024-12088 1 Redhat 2 Enterprise Linux, Openshift 2025-01-15 6.5 Medium
A flaw was found in rsync. When using the `--safe-links` option, rsync fails to properly verify if a symbolic link destination contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.
CVE-2025-21305 2025-01-15 8.8 High
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-23052 2025-01-15 7.2 High
Authenticated command injection vulnerability in the command line interface of a network management service. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands as a privileged user on the underlying operating system.
CVE-2025-23366 1 Redhat 3 Jboss Data Grid, Jboss Enterprise Application Platform, Jbosseapxp 2025-01-15 6.5 Medium
A flaw was found in the HAL Console in the Wildfly component, which does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output used as a web page that is served to other users. The attacker must be authenticated as a user that belongs to management groups “SuperUser”, “Admin”, or “Maintainer”.
CVE-2025-21234 2025-01-15 7.8 High
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-21235 2025-01-15 7.8 High
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-21236 2025-01-15 8.8 High
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-21237 2025-01-15 8.8 High
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-21268 2025-01-15 4.3 Medium
MapUrlToZone Security Feature Bypass Vulnerability
CVE-2025-21269 2025-01-15 4.3 Medium
Windows HTML Platforms Security Feature Bypass Vulnerability
CVE-2025-21314 2025-01-15 6.5 Medium
Windows SmartScreen Spoofing Vulnerability
CVE-2025-21315 2025-01-15 7.8 High
Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-21316 2025-01-15 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21318 2025-01-15 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21319 2025-01-15 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21320 2025-01-15 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2025-21321 2025-01-15 5.5 Medium
Windows Kernel Memory Information Disclosure Vulnerability