Search Results (10479 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-62720 1 Linkace 1 Linkace 2025-11-10 6.5 Medium
LinkAce is a self-hosted archive to collect website links. Versions 2.3.1 and below allow any authenticated user to export the entire database of links from all users in the system, including private links that should only be accessible to their owners. The HTML and CSV export functions in the ExportController class retrieve all links without applying any ownership or visibility filtering, effectively bypassing all access controls implemented elsewhere in the application. This issue is fixed in version 2.4.0.
CVE-2025-62721 1 Linkace 1 Linkace 2025-11-10 6.5 Medium
LinkAce is a self-hosted archive to collect website links. In versions 2.3.1 and below, authenticated RSS feed endpoints in the FeedController class fail to implement proper authorization checks, allowing any authenticated user to access all links, lists, and tags from all users in the system, regardless of their ownership or visibility settings. This issue is fixed in version 2.4.0.
CVE-2025-62520 1 Mantisbt 1 Mantisbt 2025-11-10 4.3 Medium
Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions 2.27.1 and below, due to insufficient access-level checks, any non-admin user with access to manage_config_columns_page.php can use the Copy From action to retrieve the columns configuration from a private project they have no access to. This issue is fixed in version 2.27.2.
CVE-2025-12808 1 Devolutions 1 Devolutions Server 2025-11-10 6.5 Medium
Improper access control in Devolutions allows a View-only user to retrieve sensitive third-level nested fields, such as password lists custom values, resulting in password disclosure. This issue affects the following versions : * Devolutions Server 2025.3.2.0 through 2025.3.5.0 * Devolutions Server 2025.2.15.0 and earlier
CVE-2021-32030 1 Asus 4 Gt-ac2900, Gt-ac2900 Firmware, Lyra Mini and 1 more 2025-11-10 9.8 Critical
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN.
CVE-2025-49707 1 Microsoft 24 Azure, Azure Virtual Machine, Dcadsv5-series Azure Vm and 21 more 2025-11-10 7.9 High
Improper access control in Azure Virtual Machines allows an authorized attacker to perform spoofing locally.
CVE-2025-53792 1 Microsoft 2 Azure, Azure Portal 2025-11-10 9.1 Critical
Azure Portal Elevation of Privilege Vulnerability
CVE-2025-53793 1 Microsoft 1 Azure Stack Hub 2025-11-10 7.5 High
Improper authentication in Azure Stack allows an unauthorized attacker to disclose information over a network.
CVE-2025-53778 1 Microsoft 21 Windows, Windows 10, Windows 10 1507 and 18 more 2025-11-10 8.8 High
Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.
CVE-2025-50170 1 Microsoft 14 Server, Windows, Windows 10 1809 and 11 more 2025-11-10 7.8 High
Improper handling of insufficient permissions or privileges in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.
CVE-2025-53795 1 Microsoft 1 Pc Manager 2025-11-10 9.1 Critical
Improper authorization in Microsoft PC Manager allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-53763 1 Microsoft 1 Azure 2025-11-10 9.8 Critical
Improper access control in Azure Databricks allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-53786 1 Microsoft 2 Exchange, Exchange Server 2025-11-10 8 High
On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the steps documented with the April 18th announcement. Microsoft strongly recommends reading the information, installing the April 2025 (or later) Hot Fix and implementing the changes in your Exchange Server and hybrid environment.
CVE-2025-24999 1 Microsoft 5 Sql Server, Sql Server 2016, Sql Server 2017 and 2 more 2025-11-10 8.8 High
Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.
CVE-2025-53729 1 Microsoft 1 Azure File Sync 2025-11-10 7.8 High
Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally.
CVE-2025-7627 1 Yijiusmile 1 Kkfileviewofficeedit 2025-11-07 6.3 Medium
A vulnerability was found in YiJiuSmile kkFileViewOfficeEdit up to 5fbc57c48e8fe6c1b91e0e7995e2d59615f37abd and classified as critical. Affected by this issue is the function fileUpload of the file /fileUpload. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
CVE-2023-22893 1 Strapi 1 Strapi 2025-11-07 8.2 High
Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.
CVE-2025-64110 2 Anysphere, Cursor 2 Cursor, Cursor 2025-11-07 7.5 High
Cursor is a code editor built for programming with AI. In versions 1.7.23 and below, a logic bug allows a malicious agent to read sensitive files that should be protected via cursorignore. An attacker who has already achieved prompt injection, or a malicious model, could create a new cursorignore file which can invalidate the configuration of pre-existing ones. This could allow a malicious agent to read protected files. This issue is fixed in version 2.0.
CVE-2025-37735 2 Elastic, Microsoft 2 Defend, Windows 2025-11-07 7 High
Improper preservation of permissions in Elastic Defend on Windows hosts can lead to arbitrary files on the system being deleted by the Defend service running as SYSTEM. In some cases, this could result in local privilege escalation.
CVE-2024-9683 1 Redhat 1 Quay 2025-11-07 4.8 Medium
A vulnerability was found in Quay, which allows successful authentication even when a truncated password version is provided. This flaw affects the authentication mechanism, reducing the overall security of password enforcement.  While the risk is relatively low due to the typical length of the passwords used (73 characters), this vulnerability can still be exploited to reduce the complexity of brute-force or password-guessing attacks. The truncation of passwords weakens the overall authentication process, thereby reducing the effectiveness of password policies and potentially increasing the risk of unauthorized access in the future.