Search Results (8111 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-48908 1 Huawei 1 Harmonyos 2025-07-11 6.7 Medium
Ability Auto Startup service vulnerability in the foundation process Impact: Successful exploitation of this vulnerability may affect availability.
CVE-2024-41178 1 Apache 1 Arrow 2025-07-10 7.5 High
Exposure of temporary credentials in logs in Apache Arrow Rust Object Store (`object_store` crate), version 0.10.1 and earlier on all platforms using AWS WebIdentityTokens.  On certain error conditions, the logs may contain the OIDC token passed to AssumeRoleWithWebIdentity https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithWebIdentity.html . This allows someone with access to the logs to impersonate that identity, including performing their own calls to AssumeRoleWithWebIdentity, until the OIDC token expires. Typically OIDC tokens are valid for up to an hour, although this will vary depending on the issuer. Users are recommended to use a different AWS authentication mechanism, disable logging or upgrade to version 0.10.2, which fixes this issue. Details: When using AWS WebIdentityTokens with the object_store crate, in the event of a failure and automatic retry, the underlying reqwest error, including the full URL with the credentials, potentially in the parameters, is written to the logs.  Thanks to Paul Hatcherian for reporting this vulnerability
CVE-2012-4688 1 I-gen 1 Oplynx 2025-07-10 N/A
The Central application in i-GEN opLYNX before 2.01.9 allows remote attackers to bypass authentication via vectors involving the disabling of browser JavaScript support.
CVE-2023-24904 1 Microsoft 1 Windows Server 2008 2025-07-10 7.1 High
Windows Installer Elevation of Privilege Vulnerability
CVE-2023-29343 1 Microsoft 1 Windows Sysmon 2025-07-10 7.8 High
SysInternals Sysmon for Windows Elevation of Privilege Vulnerability
CVE-2023-24946 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2025-07-10 7.8 High
Windows Backup Service Elevation of Privilege Vulnerability
CVE-2023-24899 1 Microsoft 3 Windows 11 21h2, Windows 11 22h2, Windows Server 2022 2025-07-10 7 High
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2023-28283 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-07-10 8.1 High
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVE-2024-38137 1 Microsoft 8 Windows 10 21h2, Windows 10 22h2, Windows 11 21h2 and 5 more 2025-07-10 7 High
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
CVE-2024-38131 1 Microsoft 16 Remote Desktop Client, Windows 10 1507, Windows 10 1607 and 13 more 2025-07-10 8.8 High
Clipboard Virtual Channel Extension Remote Code Execution Vulnerability
CVE-2024-38098 1 Microsoft 1 Azure Connected Machine Agent 2025-07-10 7.8 High
Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2024-38084 1 Microsoft 1 Officeplus 2025-07-10 7.8 High
Microsoft OfficePlus Elevation of Privilege Vulnerability
CVE-2024-36755 2 D-link, Dlink 3 Dir-1950 Firmware, Dir-1950, Dir-1950 Firmware 2025-07-09 6.8 Medium
D-Link DIR-1950 up to v1.11B03 does not validate SSL certificates when requesting the latest firmware version and downloading URL. This can allow attackers to downgrade the firmware version or change the downloading URL via a man-in-the-middle attack.
CVE-2025-6624 1 Snyk 1 Snyk Cli 2025-07-09 7.2 High
Versions of the package snyk before 1.1297.3 are vulnerable to Insertion of Sensitive Information into Log File through local Snyk CLI debug logs. Container Registry credentials provided via environment variables or command line arguments can be exposed when executing Snyk CLI in DEBUG or DEBUG/TRACE mode. The issue affects the following Snyk commands: 1. When snyk container test or snyk container monitor commands are run against a container registry, with debug mode enabled, the container registry credentials may be written into the local Snyk CLI debug log. This only happens with credentials specified in environment variables (SNYK_REGISTRY_USERNAME and SNYK_REGISTRY_PASSWORD), or in the CLI (--password/-p and --username/-u). 2. When snyk auth command is executed with debug mode enabled AND the log level is set to TRACE, the Snyk access / refresh credential tokens used to connect the CLI to Snyk may be written into the local CLI debug logs. 3. When snyk iac test is executed with a Remote IAC Custom rules bundle, debug mode enabled, AND the log level is set to TRACE, the docker registry token may be written into the local CLI debug logs.
CVE-2025-29953 1 Apache 1 Activemq Nms Openwire 2025-07-09 9.8 Critical
Deserialization of Untrusted Data vulnerability in Apache ActiveMQ NMS OpenWire Client. This issue affects Apache ActiveMQ NMS OpenWire Client before 2.1.1 when performing connections to untrusted servers. Such servers could abuse the unbounded deserialization in the client to provide malicious responses that may eventually cause arbitrary code execution on the client. Version 2.1.0 introduced a allow/denylist feature to restrict deserialization, but this feature could be bypassed. The .NET team has deprecated the built-in .NET binary serialization feature starting with .NET 9 and suggests migrating away from binary serialization. The project is considering to follow suit and drop this part of the NMS API altogether. Users are recommended to upgrade to version 2.1.1, which fixes the issue. We also recommend to migrate away from relying on .NET binary serialization as a hardening method for the future.
CVE-2023-51576 1 Voltronicpower 1 Viewpower 2025-07-09 N/A
Voltronic Power ViewPower Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RMI interface, which listens on TCP port 51099 by default. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22012.
CVE-2025-26058 1 Webkul 1 Qloapps 2025-07-09 4.2 Medium
Webkul QloApps v1.6.1 exposes authentication tokens in URLs during redirection. When users access the admin panel or other protected areas, the application appends sensitive authentication tokens directly to the URL.
CVE-2024-35144 1 Ibm 1 Maximo Application Suite 2025-07-08 5.3 Medium
IBM Maximo Application Suite 8.10, 8.11, and 9.0 - Monitor Component stores source code on the web server that could aid in further attacks against the system.
CVE-2025-27130 1 Welcart 1 Welcart E-commerce 2025-07-08 8.8 High
Welcart e-Commerce 2.11.6 and earlier versions contains an untrusted data deserialization vulnerability. If this vulnerability is exploited, arbitrary code may be executed by a remote unauthenticated attacker who can access websites created using the product.
CVE-2025-6279 1 Upsonic 1 Upsonic 2025-07-08 5.5 Medium
A vulnerability, which was classified as critical, has been found in Upsonic up to 0.55.6. This issue affects the function cloudpickle.loads of the file /tools/add_tool of the component Pickle Handler. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used.