Search Results (327578 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-34707 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2022-30165 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-07-24 8.8 High
Windows Kerberos Elevation of Privilege Vulnerability
CVE-2022-29126 1 Microsoft 9 Windows 10, Windows 11, Windows 8.1 and 6 more 2025-07-24 7 High
Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability
CVE-2022-26917 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Fax Compose Form Remote Code Execution Vulnerability
CVE-2022-24489 1 Microsoft 3 Windows Server 2016, Windows Server 2019, Windows Server 2022 2025-07-24 7.8 High
Cluster Client Failover (CCF) Elevation of Privilege Vulnerability
CVE-2022-24549 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-07-24 7.8 High
Windows AppX Package Manager Elevation of Privilege Vulnerability
CVE-2022-24488 1 Microsoft 4 Windows 10, Windows 11, Windows Server 2016 and 1 more 2025-07-24 7.8 High
Windows Desktop Bridge Elevation of Privilege Vulnerability
CVE-2022-24494 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2022-26916 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Fax Compose Form Remote Code Execution Vulnerability
CVE-2022-24765 6 Apple, Debian, Fedoraproject and 3 more 7 Xcode, Debian Linux, Fedora and 4 more 2025-07-24 6 Medium
Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\Users` if the user profile is located in `C:\Users\my-user-name`.
CVE-2022-26807 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7 High
Windows Work Folder Service Elevation of Privilege Vulnerability
CVE-2022-24468 1 Microsoft 1 Azure Site Recovery 2025-07-24 7.2 High
Azure Site Recovery Remote Code Execution Vulnerability
CVE-2021-38638 1 Microsoft 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more 2025-07-24 7.8 High
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2024-47606 3 Debian, Gstreamer Project, Redhat 8 Debian Linux, Gstreamer, Enterprise Linux and 5 more 2025-07-24 9.8 Critical
GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem->allocator->mem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.
CVE-2024-25638 1 Dnsjava 1 Dnsjava 2025-07-24 8.9 High
dnsjava is an implementation of DNS in Java. Records in DNS replies are not checked for their relevance to the query, allowing an attacker to respond with RRs from different zones. This vulnerability is fixed in 3.6.0.
CVE-2021-3453 1 Lenovo 42 730s-13iml, 730s-13iml Firmware, Ideacentre Aio 5-24imb05 and 39 more 2025-07-24 6.8 Medium
Some Lenovo Notebook, ThinkPad, and Lenovo Desktop systems have BIOS modules unprotected by Intel Boot Guard that could allow an attacker with physical access the ability to write to the SPI flash storage.
CVE-2021-34487 1 Microsoft 10 Windows 10, Windows 10 1607, Windows 10 1809 and 7 more 2025-07-24 7 High
Windows Event Tracing Elevation of Privilege Vulnerability
CVE-2021-34536 1 Microsoft 11 Windows 10, Windows 10 1507, Windows 10 1607 and 8 more 2025-07-24 7.8 High
Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2024-25131 2025-07-23 8.8 High
A flaw was found in the MustGather.managed.openshift.io Custom Defined Resource (CRD) of OpenShift Dedicated. A non-privileged user on the cluster can create a MustGather object with a specially crafted file and set the most privileged service account to run the job. This can allow a standard developer user to escalate their privileges to a cluster administrator and pivot to the AWS environment.
CVE-2025-54371 2025-07-23 N/A
This CVE is a duplicate of another CVE.