Total
291504 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-0014 | 2025-04-24 | 7.3 High | ||
Incorrect default permissions on the AMD Ryzen(TM) AI installation folder could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution. | ||||
CVE-2024-55542 | 2025-04-24 | N/A | ||
Local privilege escalation due to excessive permissions assigned to Tray Monitor service. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39169, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 35895. | ||||
CVE-2025-24826 | 2025-04-24 | N/A | ||
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 4625. | ||||
CVE-2025-24831 | 2025-04-24 | N/A | ||
Local privilege escalation due to unquoted search path vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378. | ||||
CVE-2025-24830 | 2025-04-24 | N/A | ||
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378. | ||||
CVE-2025-24829 | 2025-04-24 | N/A | ||
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378. | ||||
CVE-2025-24827 | 2025-04-24 | N/A | ||
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378. | ||||
CVE-2025-24828 | 2025-04-24 | N/A | ||
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378. | ||||
CVE-2025-30407 | 2025-04-24 | N/A | ||
Local privilege escalation due to a binary hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39713. | ||||
CVE-2025-22457 | 1 Ivanti | 3 Connect Secure, Neurons For Zero-trust Access, Policy Secure | 2025-04-24 | 9 Critical |
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution. | ||||
CVE-2025-46381 | 2025-04-24 | N/A | ||
Not used | ||||
CVE-2025-46380 | 2025-04-24 | N/A | ||
Not used | ||||
CVE-2025-46379 | 2025-04-24 | N/A | ||
Not used | ||||
CVE-2025-46378 | 2025-04-24 | N/A | ||
Not used | ||||
CVE-2025-46377 | 2025-04-24 | N/A | ||
Not used | ||||
CVE-2025-46376 | 2025-04-24 | N/A | ||
Not used | ||||
CVE-2025-46375 | 2025-04-24 | N/A | ||
Not used | ||||
CVE-2025-46374 | 2025-04-24 | N/A | ||
Not used | ||||
CVE-2024-58251 | 2025-04-23 | 2.5 Low | ||
In netstat in BusyBox through 1.37.0, local users can launch of network application with an argv[0] containing an ANSI terminal escape sequence, leading to a denial of service (terminal locked up) when netstat is used by a victim. | ||||
CVE-2025-3378 | 1 Pcman | 1 Ftp Server | 2025-04-23 | 7.3 High |
A vulnerability classified as critical has been found in PCMan FTP Server 2.0.7. Affected is an unknown function of the component EPRT Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |