Search Results (310237 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-21548 2025-07-24 7.5 High
Versions of the package bun after 0.0.12 and before 1.1.30 are vulnerable to Prototype Pollution due to improper input sanitization. An attacker can exploit this vulnerability through Bun's APIs that accept objects. **Note:** This issue relates to the widely known and actively developed 'Bun' JavaScript runtime. The bun package on NPM at versions 0.0.12 and below belongs to a different and older project that happened to claim the 'bun' name in the past.
CVE-2022-35768 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2022-34707 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2022-30206 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-30165 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-07-24 8.8 High
Windows Kerberos Elevation of Privilege Vulnerability
CVE-2022-29126 1 Microsoft 9 Windows 10, Windows 11, Windows 8.1 and 6 more 2025-07-24 7 High
Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability
CVE-2022-29106 1 Microsoft 4 Windows 10, Windows Server 2016, Windows Server 2019 and 1 more 2025-07-24 7 High
Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability
CVE-2022-26917 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Fax Compose Form Remote Code Execution Vulnerability
CVE-2022-24489 1 Microsoft 3 Windows Server 2016, Windows Server 2019, Windows Server 2022 2025-07-24 7.8 High
Cluster Client Failover (CCF) Elevation of Privilege Vulnerability
CVE-2022-24549 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-07-24 7.8 High
Windows AppX Package Manager Elevation of Privilege Vulnerability
CVE-2022-24488 1 Microsoft 4 Windows 10, Windows 11, Windows Server 2016 and 1 more 2025-07-24 7.8 High
Windows Desktop Bridge Elevation of Privilege Vulnerability
CVE-2022-24494 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2022-26916 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Fax Compose Form Remote Code Execution Vulnerability
CVE-2022-24765 6 Apple, Debian, Fedoraproject and 3 more 7 Xcode, Debian Linux, Fedora and 4 more 2025-07-24 6 Medium
Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\Users` if the user profile is located in `C:\Users\my-user-name`.
CVE-2022-26807 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7 High
Windows Work Folder Service Elevation of Privilege Vulnerability
CVE-2022-24468 1 Microsoft 1 Azure Site Recovery 2025-07-24 7.2 High
Azure Site Recovery Remote Code Execution Vulnerability
CVE-2021-38638 1 Microsoft 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more 2025-07-24 7.8 High
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2021-3347 4 Debian, Fedoraproject, Linux and 1 more 10 Debian Linux, Fedora, Linux Kernel and 7 more 2025-07-24 7.8 High
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
CVE-2020-14381 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-07-24 7.8 High
A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVE-2021-0642 1 Google 1 Android 2025-07-24 5.5 Medium
In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-185126149