Search Results (10052 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-9139 1 Scada-lts 1 Scada-lts 2025-09-11 4.3 Medium
A vulnerability was determined in Scada-LTS 2.7.8.1. Affected by this vulnerability is an unknown functionality of the file /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr. Executing manipulation can lead to information disclosure. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor explains: "[T]he risks of indicated vulnerabilities seem to be minimal as all scenarios likely require admin permissions. Moreover, regardless our team fixes those vulnerabilities - the overall risk change to the user due to malicious admin actions will not be lower."
CVE-2025-8764 1 Linlinjava 1 Litemall 2025-09-11 6.3 Medium
A vulnerability classified as critical has been found in linlinjava litemall up to 1.8.0. Affected is the function Upload of the file /wx/storage/upload. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-9602 2 Rockoa, Xinhu 2 Rockoa, Rockoa 2025-09-11 6.3 Medium
A vulnerability was found in Xinhu RockOA up to 2.6.9. Impacted is the function publicsaveAjax of the file /index.php. Performing manipulation results in improper authorization. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
CVE-2025-54599 1 Bevy 1 Events And Groups 2025-09-10 7.5 High
The Bevy Event service through 2025-07-22, as used for eBay Seller Events and other activities, allows account takeover, if SSO is used, when a victim changes the email address that they have configured. To exploit this, an attacker would create their own account and perform an SSO login. The root cause of the issue is SSO misconfiguration.
CVE-2025-9847 1 Scriptandtools 1 Real Estate Management System 2025-09-10 6.3 Medium
A weakness has been identified in ScriptAndTools Real Estate Management System 1.0. Impacted is an unknown function of the file register.php. This manipulation of the argument uimage causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
CVE-2025-29927 1 Vercel 1 Next.js 2025-09-10 9.1 Critical
Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.
CVE-2024-51479 2 Redhat, Vercel 2 Trusted Artifact Signer, Next.js 2025-09-10 7.5 High
Next.js is a React framework for building full-stack web applications. In affected versions if a Next.js application is performing authorization in middleware based on pathname, it was possible for this authorization to be bypassed for pages directly under the application's root directory. For example: * [Not affected] `https://example.com/` * [Affected] `https://example.com/foo` * [Not affected] `https://example.com/foo/bar`. This issue is patched in Next.js `14.2.15` and later. If your Next.js application is hosted on Vercel, this vulnerability has been automatically mitigated, regardless of Next.js version. There are no official workarounds for this vulnerability.
CVE-2025-28041 1 Liaoxuefeng 1 Itranswarp 2025-09-10 8.6 High
Incorrect access control in the doFilter function of itranswarp up to 2.19 allows attackers to access sensitive components without authentication.
CVE-2025-47161 1 Microsoft 1 Defender For Endpoint 2025-09-10 7.8 High
Improper access control in Microsoft Defender for Endpoint allows an authorized attacker to elevate privileges locally.
CVE-2025-29813 1 Microsoft 2 Azure Devops, Azure Devops Server 2025-09-10 10 Critical
[Spoofable identity claims] Authentication Bypass by Assumed-Immutable Data in Azure DevOps allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-29827 1 Microsoft 1 Azure Automation 2025-09-10 9.9 Critical
Improper Authorization in Azure Automation allows an authorized attacker to elevate privileges over a network.
CVE-2025-26685 1 Microsoft 1 Defender For Identity 2025-09-10 6.5 Medium
Improper authentication in Microsoft Defender for Identity allows an unauthorized attacker to perform spoofing over an adjacent network.
CVE-2025-33072 1 Microsoft 1 Msagsfeedback.azurewebsites.net 2025-09-10 8.1 High
Improper access control in Azure allows an unauthorized attacker to disclose information over a network.
CVE-2025-29826 1 Microsoft 1 Dataverse 2025-09-10 7.3 High
Improper handling of insufficient permissions or privileges in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network.
CVE-2025-29973 1 Microsoft 1 Azure File Sync 2025-09-10 7 High
Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally.
CVE-2025-21293 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-09-09 8.8 High
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2025-21185 1 Microsoft 1 Edge Chromium 2025-09-09 6.5 Medium
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2025-21380 1 Microsoft 1 Azure Marketplace 2025-09-09 8.8 High
Improper access control in Azure SaaS Resources allows an authorized attacker to disclose information over a network.
CVE-2025-21340 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2025-09-09 5.5 Medium
Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
CVE-2025-21275 1 Microsoft 8 Windows 10 21h2, Windows 10 22h2, Windows 11 22h2 and 5 more 2025-09-09 7.8 High
Windows App Package Installer Elevation of Privilege Vulnerability