Search Results (9583 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-7181 1 Carmelo 1 Staff Audit System 2025-07-08 6.3 Medium
A vulnerability, which was classified as critical, was found in code-projects Staff Audit System 1.0. Affected is an unknown function of the file /test.php. The manipulation of the argument uploadedfile leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-7151 1 Campcodes 1 Advanced Online Voting System 2025-07-08 6.3 Medium
A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/voters_add.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-7152 1 Campcodes 1 Advanced Online Voting System 2025-07-08 6.3 Medium
A vulnerability classified as critical has been found in Campcodes Advanced Online Voting System 1.0. Affected is an unknown function of the file /admin/candidates_add.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-7124 1 Anisha 1 Online Note Sharing 2025-07-08 6.3 Medium
A vulnerability classified as critical has been found in code-projects Online Note Sharing 1.0. Affected is an unknown function of the file /dashboard/userprofile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-1568 1 Google 1 Chrome Os 2025-07-08 8.8 High
Access Control Vulnerability in Gerrit chromiumos project configuration in Google ChromeOS 16063.87.0 allows an attacker with a registered Gerrit account to inject malicious code into ChromeOS projects and potentially achieve Remote Code Execution and Denial of Service via editing trusted pipelines by insufficient access controls and misconfigurations in Gerrit's project.config.
CVE-2024-29215 1 Mattermost 1 Mattermost Server 2025-07-08 4.3 Medium
Mattermost versions 9.5.x <= 9.5.3, 9.7.x <= 9.7.1, 9.6.x <= 9.6.1, 8.1.x <= 8.1.12 fail to enforce proper access control which allows a user to run a slash command in a channel they are not a member of via linking a playbook run to that channel and running a slash command as a playbook task command.
CVE-2025-32726 1 Microsoft 1 Visual Studio Code 2025-07-08 6.8 Medium
Improper access control in Visual Studio Code allows an authorized attacker to elevate privileges locally.
CVE-2025-4536 1 Gosuncntech 1 Group Audio-visual Integrated Management 2025-07-08 5.3 Medium
A vulnerability has been found in Gosuncn Technology Group Audio-Visual Integrated Management Platform 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sysmgr/user/listByPage. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-4535 1 Gosuncntech 1 Group Audio-visual Integrated Management 2025-07-08 5.3 Medium
A vulnerability, which was classified as problematic, was found in Gosuncn Technology Group Audio-Visual Integrated Management Platform 4.0. Affected is an unknown function of the file /config/config.properties of the component Configuration File Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-53532 2025-07-08 5.3 Medium
giscus is a commenting system powered by GitHub Discussions. A bug in giscus' discussions creation API allowed an unauthorized user to create discussions on any repository where giscus is installed. This affects the server-side part of giscus, which is provided via http://giscus.app or your own self-hosted service. This vulnerability is fixed by the c43af7806e65adfcf4d0feeebef76dc36c95cb9a and 4b9745fe1a326ce08d69f8a388331bc993d19389 commits.
CVE-2012-5864 1 Sinapsitech 4 Esolar Duo Photovoltaic System Monitor, Esolar Light Photovoltaic System Monitor, Esolar Photovoltaic System Monitor and 1 more 2025-07-08 N/A
These Sinapsi devices do not check if users that visit pages within the device have properly authenticated. By directly visiting the pages within the device, attackers can gain unauthorized access with administrative privileges.
CVE-2024-49049 1 Microsoft 1 Remote Ssh 2025-07-08 7.1 High
Visual Studio Code Remote Extension Elevation of Privilege Vulnerability
CVE-2024-49044 1 Microsoft 1 Visual Studio 2022 2025-07-08 6.7 Medium
Visual Studio Elevation of Privilege Vulnerability
CVE-2024-43602 1 Microsoft 1 Azure Cyclecloud 2025-07-08 9.9 Critical
Azure CycleCloud Remote Code Execution Vulnerability
CVE-2024-43530 1 Microsoft 5 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 2 more 2025-07-08 7.8 High
Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-38204 1 Microsoft 1 Azure Functions 2025-07-08 7.5 High
Improper access control in Imagine Cup allows an authorized attacker to elevate privileges over a network.
CVE-2024-43590 1 Microsoft 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 2025-07-08 7.8 High
Visual C++ Redistributable Installer Elevation of Privilege Vulnerability
CVE-2024-43456 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2025-07-08 4.8 Medium
Windows Remote Desktop Services Tampering Vulnerability
CVE-2024-38124 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2025-07-08 9 Critical
Windows Netlogon Elevation of Privilege Vulnerability
CVE-2024-38129 1 Microsoft 1 Windows Server 2022 23h2 2025-07-08 7.5 High
Windows Kerberos Elevation of Privilege Vulnerability