Filtered by vendor
Subscriptions
Total
1299 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-29837 | 2025-05-17 | 5.5 Medium | ||
Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally. | ||||
CVE-2025-29975 | 2025-05-17 | 7.8 High | ||
Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-27727 | 2025-05-16 | 7.8 High | ||
Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-21204 | 2025-05-16 | 7.8 High | ||
Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-20003 | 2025-05-16 | 8.2 High | ||
Improper link resolution before file access ('Link Following') for some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2025-4211 | 2025-05-16 | N/A | ||
Improper Link Resolution Before File Access ('Link Following') vulnerability in QFileSystemEngine in the Qt corelib module on Windows which potentially allows Symlink Attacks and the use of Malicious Files. Issue originates from CVE-2024-38081. The vulnerability arises from the use of the GetTempPath API, which can be exploited by attackers to manipulate temporary file paths, potentially leading to unauthorized access and privilege escalation. The affected public API in the Qt Framework is QDir::tempPath() and anything that uses it, such as QStandardPaths with TempLocation, QTemporaryDir, and QTemporaryFile.This issue affects all version of Qt up to and including 5.15.18, from 6.0.0 through 6.5.8, from 6.6.0 through 6.8.1. It is fixed in Qt 5.15.19, Qt 6.5.9, Qt 6.8.2, 6.9.0 | ||||
CVE-2024-35254 | 1 Microsoft | 1 Azure Monitor Agent | 2025-05-16 | 7.1 High |
Azure Monitor Agent Elevation of Privilege Vulnerability | ||||
CVE-2024-35253 | 1 Microsoft | 1 Azure File Sync | 2025-05-16 | 4.4 Medium |
Microsoft Azure File Sync Elevation of Privilege Vulnerability | ||||
CVE-2024-30104 | 1 Microsoft | 2 365 Apps, Office | 2025-05-16 | 7.8 High |
Microsoft Office Remote Code Execution Vulnerability | ||||
CVE-2024-30093 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-05-16 | 7.3 High |
Windows Storage Elevation of Privilege Vulnerability | ||||
CVE-2024-30065 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-05-16 | 5.5 Medium |
Windows Themes Denial of Service Vulnerability | ||||
CVE-2024-30076 | 1 Microsoft | 11 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 8 more | 2025-05-16 | 6.8 Medium |
Windows Container Manager Service Elevation of Privilege Vulnerability | ||||
CVE-2025-1683 | 2025-05-15 | 7.8 High | ||
Improper link resolution before file access in the Nomad module of the 1E Client, in versions prior to 25.3, enables an attacker with local unprivileged access on a Windows system to delete arbitrary files on the device by exploiting symbolic links. | ||||
CVE-2025-22247 | 2025-05-14 | 6.1 Medium | ||
VMware Tools contains an insecure file handling vulnerability. A malicious actor with non-administrative privileges on a guest VM may tamper the local files to trigger insecure file operations within that VM. | ||||
CVE-2025-29795 | 2025-05-13 | 7.8 High | ||
Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally. | ||||
CVE-2025-25008 | 2025-05-13 | 7.1 High | ||
Improper link resolution before file access ('link following') in Microsoft Windows allows an authorized attacker to elevate privileges locally. | ||||
CVE-2024-49107 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-05-13 | 7.3 High |
WmsRepair Service Elevation of Privilege Vulnerability | ||||
CVE-2024-49059 | 1 Microsoft | 3 365 Apps, Office, Office Long Term Servicing Channel | 2025-05-13 | 7 High |
Microsoft Office Elevation of Privilege Vulnerability | ||||
CVE-2024-9341 | 2 Containers, Redhat | 5 Common, Enterprise Linux, Openshift and 2 more | 2025-05-13 | 5.4 Medium |
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system. | ||||
CVE-2024-8404 | 1 Papercut | 2 Papercut Mf, Papercut Ng | 2025-05-13 | 7.8 High |
An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server via the web-print-hot-folder. Important: In most installations, this risk is mitigated by the default Windows Server configuration, which restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log into the local console of the Windows environment hosting the PaperCut NG/MF application server. Update: This CVE has been updated in May 2025 to update the fixed version and fix process. Please refer to the May 2025 Security Bulletin. Note: This CVE has been split from CVE-2024-3037. |