Search Results (3347 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-38136 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2025-07-10 7 High
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
CVE-2024-38191 1 Microsoft 13 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 10 more 2025-07-10 7.8 High
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2025-26649 1 Microsoft 6 Windows 11 22h2, Windows 11 23h2, Windows 11 24h2 and 3 more 2025-07-10 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.
CVE-2024-2913 1 Mintplexlabs 1 Anythingllm 2025-07-09 N/A
A race condition vulnerability exists in the mintplex-labs/anything-llm repository, specifically within the user invite acceptance process. Attackers can exploit this vulnerability by sending multiple concurrent requests to accept a single user invite, allowing the creation of multiple user accounts from a single invite link intended for only one user. This bypasses the intended security mechanism that restricts invite acceptance to a single user, leading to unauthorized user creation without detection in the invite tab. The issue is due to the lack of validation for concurrent requests in the backend.
CVE-2025-4799 1 Wp-downloadmanager Project 1 Wp-downloadmanager 2025-07-09 7.2 High
The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file deletion due to lack of restriction on the directory a file can be deleted from in all versions up to, and including, 1.68.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This vulnerability can be paired with CVE-2025-4798 to delete any file within the WordPress root directory.
CVE-2024-6250 1 Lollms 1 Lollms Web Ui 2025-07-09 N/A
An absolute path traversal vulnerability exists in parisneo/lollms-webui v9.6, specifically in the `open_file` endpoint of `lollms_advanced.py`. The `sanitize_path` function with `allow_absolute_path=True` allows an attacker to access arbitrary files and directories on a Windows system. This vulnerability can be exploited to read any file and list arbitrary directories on the affected system.
CVE-2025-0759 3 Ibm, Linux, Microsoft 3 Entirex, Linux Kernel, Windows 2025-07-08 3.3 Low
IBM EntireX 11.1 could allow a local user to unintentionally modify data timestamp integrity due to improper shared resource synchronization.
CVE-2025-27492 1 Microsoft 6 Windows 11 22h2, Windows 11 23h2, Windows 11 24h2 and 3 more 2025-07-08 7 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.
CVE-2024-10047 1 Lollms 1 Lollms Web Ui 2025-07-08 N/A
parisneo/lollms-webui versions v9.9 to the latest are vulnerable to a directory listing vulnerability. An attacker can list arbitrary directories on a Windows system by sending a specially crafted HTTP request to the /open_file endpoint.
CVE-2024-49046 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-07-08 7.8 High
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-43452 1 Microsoft 11 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 8 more 2025-07-08 7.5 High
Windows Registry Elevation of Privilege Vulnerability
CVE-2024-43511 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-07-08 7 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2022-30214 1 Microsoft 3 Windows Server 2016, Windows Server 2019, Windows Server 2022 2025-07-08 6.6 Medium
Windows DNS Server Remote Code Execution Vulnerability
CVE-2022-30212 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2025-07-08 4.7 Medium
Windows Connected Devices Platform Service Information Disclosure Vulnerability
CVE-2022-30205 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-08 6.6 Medium
Windows Group Policy Elevation of Privilege Vulnerability
CVE-2022-24525 1 Microsoft 3 Windows 10, Windows 11, Windows Server 2025-07-08 7 High
Windows Update Stack Elevation of Privilege Vulnerability
CVE-2022-23283 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2025-07-08 7 High
Windows ALPC Elevation of Privilege Vulnerability
CVE-2022-21975 1 Microsoft 6 Windows 10, Windows 8.1, Windows Server and 3 more 2025-07-08 4.7 Medium
Windows Hyper-V Denial of Service Vulnerability
CVE-2022-24505 1 Microsoft 6 Windows 10, Windows 11, Windows Server and 3 more 2025-07-08 7 High
Windows ALPC Elevation of Privilege Vulnerability
CVE-2025-5927 1 Wpeverest 1 Everest Forms 2025-07-08 7.5 High
The Everest Forms (Pro) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_entry_files() function in all versions up to, and including, 1.9.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability requires an admin to trigger the deletion via deletion of a form entry and cannot be carried out by the attacker alone.