Search Results (1908 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-47956 1 Microsoft 1 Windows Security App 2025-07-11 5.5 Medium
External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.
CVE-2023-29324 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-07-10 6.5 Medium
Windows MSHTML Platform Security Feature Bypass Vulnerability
CVE-2024-38173 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2025-07-10 6.7 Medium
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2024-38165 1 Microsoft 2 Windows 11 22h2, Windows 11 23h2 2025-07-10 6.5 Medium
Windows Compressed Folder Tampering Vulnerability
CVE-2025-29819 1 Microsoft 1 Windows Admin Center 2025-07-10 6.2 Medium
External control of file name or path in Azure Portal Windows Admin Center allows an unauthorized attacker to disclose information locally.
CVE-2025-25478 1 Syspass 1 Syspass 2025-07-09 6.5 Medium
The account file upload functionality in Syspass 3.2.x fails to properly handle special characters in filenames. This mismanagement leads to the disclosure of the web application s source code, exposing sensitive information such as the database password.
CVE-2025-1972 1 Webtoffee 1 Import Export Wordpress Users 2025-07-09 2.7 Low
The Export and Import Users and Customers plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the admin_log_page() function in all versions up to, and including, 2.6.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary log files on the server.
CVE-2023-51579 1 Voltronicpower 1 Viewpower 2025-07-09 N/A
Voltronic Power ViewPower Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Voltronic Power ViewPower. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the product installer. The issue results from incorrect permissions set on folders. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22025.
CVE-2025-1911 1 Webtoffee 1 Product Import Export For Woocommerce 2025-07-09 2.7 Low
The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the admin_log_page() function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary log files on the server.
CVE-2024-38657 1 Ivanti 2 Connect Secure, Policy Secure 2025-07-09 4.9 Medium
External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to write arbitrary files.
CVE-2024-38029 1 Microsoft 1 Windows Server 2022 23h2 2025-07-08 7.5 High
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
CVE-2024-43615 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2025-07-08 7.1 High
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
CVE-2024-43581 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2025-07-08 7.1 High
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
CVE-2025-40574 1 Siemens 2 Scalance Lpe9403, Scalance Lpe9403 Firmware 2025-07-08 7.8 High
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices do not properly assign permissions to critical ressources. This could allow a non-privileged local attacker to interact with the backupmanager service.
CVE-2025-40572 1 Siemens 2 Scalance Lpe9403, Scalance Lpe9403 Firmware 2025-07-08 5.5 Medium
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions < V4.0 HF0). Affected devices do not properly assign permissions to critical ressources. This could allow a non-privileged local attacker to access sensitive information stored on the device.
CVE-2025-6463 1 Incsub 1 Forminator 2025-07-07 8.8 High
The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'entry_delete_upload_files' function in all versions up to, and including, 1.44.2. This makes it possible for unauthenticated attackers to include arbitrary file paths in a form submission. The file will be deleted when the form submission is deleted, whether by an Administrator or via auto-deletion determined by plugin settings. This can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CVE-2025-36537 1 Teamviewer 2 Full Client, Host 2025-07-06 7 High
Incorrect Permission Assignment for Critical Resource in the TeamViewer Client (Full and Host) of TeamViewer Remote and Tensor prior Version 15.67 on Windows allows a local unprivileged user to trigger arbitrary file deletion with SYSTEM privileges via leveraging the MSI rollback mechanism. The vulnerability only applies to the Remote Management features: Backup, Monitoring, and Patch Management.
CVE-2024-47104 1 Ibm 1 I 2025-07-03 6.8 Medium
IBM i 7.4 and 7.5 is vulnerable to an authenticated user gaining elevated privilege to a physical file. A user with authority to a view can alter the based-on physical file security attributes without having object management rights to the physical file. A malicious actor can use the elevated privileges to perform actions restricted by their view privileges.
CVE-2025-24996 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-07-03 6.5 Medium
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-49588 2025-07-03 N/A
Linkwarden is a self-hosted, open-source collaborative bookmark manager to collect, organize and archive webpages. In version 2.10.2, the server accepts links of format file:///etc/passwd and doesn't do any validation before sending them to parsers and playwright, this can result in leak of other user's links (and in some cases it might be possible to leak environment secrets). This issue has been patched in version 2.10.3 which has not been made public at time of publication.