Export limit exceeded: 327585 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (327585 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-2913 1 Hdfgroup 1 Hdf5 2025-07-24 3.3 Low
A vulnerability was found in HDF5 up to 1.14.6. It has been rated as critical. Affected by this issue is the function H5FL__blk_gc_list of the file src/H5FL.c. The manipulation of the argument H5FL_blk_head_t leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
CVE-2025-2912 1 Hdfgroup 1 Hdf5 2025-07-24 3.3 Low
A vulnerability was found in HDF5 up to 1.14.6. It has been declared as problematic. Affected by this vulnerability is the function H5O_msg_flush of the file src/H5Omessage.c. The manipulation of the argument oh leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
CVE-2025-34092 1 Google 1 Chrome 2025-07-24 N/A
Neither filed by Chrome nor a valid security vulnerability.
CVE-2025-34091 1 Google 1 Chrome 2025-07-24 N/A
Neither filed by Chrome nor a valid security vulnerability.
CVE-2025-34090 1 Google 1 Chrome 2025-07-24 N/A
Neither filed by Chrome nor a valid security vulnerability.
CVE-2024-21548 2025-07-24 7.5 High
Versions of the package bun after 0.0.12 and before 1.1.30 are vulnerable to Prototype Pollution due to improper input sanitization. An attacker can exploit this vulnerability through Bun's APIs that accept objects. **Note:** This issue relates to the widely known and actively developed 'Bun' JavaScript runtime. The bun package on NPM at versions 0.0.12 and below belongs to a different and older project that happened to claim the 'bun' name in the past.
CVE-2022-35768 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2022-34707 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2022-30165 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-07-24 8.8 High
Windows Kerberos Elevation of Privilege Vulnerability
CVE-2022-29126 1 Microsoft 9 Windows 10, Windows 11, Windows 8.1 and 6 more 2025-07-24 7 High
Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability
CVE-2022-26917 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Fax Compose Form Remote Code Execution Vulnerability
CVE-2022-24489 1 Microsoft 3 Windows Server 2016, Windows Server 2019, Windows Server 2022 2025-07-24 7.8 High
Cluster Client Failover (CCF) Elevation of Privilege Vulnerability
CVE-2022-24549 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-07-24 7.8 High
Windows AppX Package Manager Elevation of Privilege Vulnerability
CVE-2022-24488 1 Microsoft 4 Windows 10, Windows 11, Windows Server 2016 and 1 more 2025-07-24 7.8 High
Windows Desktop Bridge Elevation of Privilege Vulnerability
CVE-2022-24494 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2022-26916 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7.8 High
Windows Fax Compose Form Remote Code Execution Vulnerability
CVE-2022-24765 6 Apple, Debian, Fedoraproject and 3 more 7 Xcode, Debian Linux, Fedora and 4 more 2025-07-24 6 Medium
Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\Users` if the user profile is located in `C:\Users\my-user-name`.
CVE-2022-26807 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-24 7 High
Windows Work Folder Service Elevation of Privilege Vulnerability
CVE-2022-24468 1 Microsoft 1 Azure Site Recovery 2025-07-24 7.2 High
Azure Site Recovery Remote Code Execution Vulnerability
CVE-2021-38638 1 Microsoft 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more 2025-07-24 7.8 High
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability