Search Results (1640 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-32335 1 Ibm 2 Maximo Application Suite, Maximo Asset Management 2025-01-14 3.7 Low
IBM Maximo Application Suite 8.10, 8.11 and IBM Maximo Asset Management 7.6.1.3 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 255075.
CVE-2023-33245 1 Minecraft 1 Minecraft 2025-01-10 8.8 High
Minecraft through 1.19 and 1.20 pre-releases before 7 (Java) allow arbitrary file overwrite, and possibly code execution, via crafted world data that contains a symlink.
CVE-2023-34204 1 Imapsync Project 1 Imapsync 2025-01-10 6.5 Medium
imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it.
CVE-2024-7233 1 Avast 1 Free Antivirus 2025-01-08 7.8 High
Avast Free Antivirus AvastSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to delete a folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23731.
CVE-2024-13043 1 Watchguard 1 Panda Dome 2025-01-03 7.8 High
Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Hotspot Shield. By creating a junction, an attacker can abuse the application to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23478.
CVE-2024-1867 1 Gdata-software 1 Total Security 2025-01-03 7.8 High
G DATA Total Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the G DATA Backup Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22312.
CVE-2024-1868 1 Gdata-software 1 Total Security 2025-01-03 7.8 High
G DATA Total Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the G DATA Backup Service. By creating a symbolic link, an attacker can abuse the service to overwrite a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22313.
CVE-2024-30377 1 Gdata-software 1 Total Security 2025-01-03 7.8 High
G DATA Total Security Scan Server Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the G DATA AntiVirus Scan Server. By creating a symbolic link, an attacker can abuse the service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23381.
CVE-2023-34283 1 Netgear 2 Rax30, Rax30 Firmware 2025-01-03 4.6 Medium
NETGEAR RAX30 USB Share Link Following Information Disclosure Vulnerability. This vulnerability allows physically present attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of symbolic links on removable USB media. By creating a symbolic link, an attacker can abuse the router's web server to access arbitrary local files. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-19498.
CVE-2024-28238 1 Monospace 1 Directus 2025-01-03 2.3 Low
Directus is a real-time API and App dashboard for managing SQL database content. When reaching the /files page, a JWT is passed via GET request. Inclusion of session tokens in URLs poses a security risk as URLs are often logged in various places (e.g., web server logs, browser history). Attackers gaining access to these logs may hijack active user sessions, leading to unauthorized access to sensitive information or actions on behalf of the user. This issue has been addressed in version 10.10.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2022-21997 1 Microsoft 23 Windows 10, Windows 10 1507, Windows 10 1607 and 20 more 2025-01-02 7.1 High
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-21838 1 Microsoft 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more 2025-01-02 5.5 Medium
Windows Cleanup Manager Elevation of Privilege Vulnerability
CVE-2022-21895 1 Microsoft 16 Windows 10, Windows 10 1507, Windows 10 1607 and 13 more 2025-01-02 7.8 High
Windows User Profile Service Elevation of Privilege Vulnerability
CVE-2023-35633 1 Microsoft 6 Windows 10 1507, Windows Server 2008, Windows Server 2008 R2 and 3 more 2025-01-01 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35624 1 Microsoft 1 Azure Connected Machine Agent 2025-01-01 7.3 High
Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2023-36005 1 Microsoft 22 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 19 more 2025-01-01 7.5 High
Windows Telephony Server Elevation of Privilege Vulnerability
CVE-2023-36391 1 Microsoft 2 Windows 11 23h2, Windows 11 23h2 2025-01-01 7.8 High
Local Security Authority Subsystem Service Elevation of Privilege Vulnerability
CVE-2023-35379 1 Microsoft 2 Windows Server 2008, Windows Server 2008 R2 2025-01-01 7.8 High
Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability
CVE-2023-36903 1 Microsoft 19 Windows 10, Windows 10 1507, Windows 10 1607 and 16 more 2025-01-01 7.8 High
Windows System Assessment Tool Elevation of Privilege Vulnerability
CVE-2023-36876 1 Microsoft 2 Windows Server 2008, Windows Server 2008 R2 2025-01-01 7.1 High
Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability