Search Results (9040 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-34082 1 Getgrav 1 Grav 2025-01-02 8.5 High
Grav is a file-based Web platform. Prior to version 1.7.46, a low privilege user account with page edit privilege can read any server files using Twig Syntax. This includes Grav user account files - `/grav/user/accounts/*.yaml`. This file stores hashed user password, 2FA secret, and the password reset token. This can allow an adversary to compromise any registered account and read any file in the web server by resetting a password for a user to get access to the password reset token from the file or by cracking the hashed password. A low privileged user may also perform a full account takeover of other registered users including Administrators. Version 1.7.46 contains a patch.
CVE-2022-37966 4 Fedoraproject, Microsoft, Netapp and 1 more 12 Fedora, Windows Server 2008, Windows Server 2008 R2 and 9 more 2025-01-02 8.1 High
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability
CVE-2022-21970 1 Microsoft 1 Edge Chromium 2025-01-02 6.1 Medium
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2022-21902 1 Microsoft 14 Windows 10, Windows 10 1607, Windows 10 1809 and 11 more 2025-01-02 7.8 High
Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2024-13109 2025-01-02 5.3 Medium
A vulnerability was found in Beijing Yunfan Internet Technology Yunfan Learning Examination System 1.9.2. It has been rated as critical. This issue affects some unknown processing of the file /doc.html. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2023-23412 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2025-01-01 7.8 High
Windows Accounts Picture Elevation of Privilege Vulnerability
CVE-2023-21777 1 Microsoft 2 Azure App Service On Azure Stack, Azure Stack Hub 2025-01-01 8.7 High
Azure App Service on Azure Stack Hub Elevation of Privilege Vulnerability
CVE-2023-21774 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2025-01-01 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-21773 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2025-01-01 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-21772 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2025-01-01 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-21755 1 Microsoft 20 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 17 more 2025-01-01 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-21730 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2025-01-01 7.8 High
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVE-2023-21561 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2025-01-01 7.8 High
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVE-2023-21551 1 Microsoft 13 Windows 10 1809, Windows 10 20h2, Windows 10 20h2 and 10 more 2025-01-01 7.8 High
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVE-2023-21549 1 Microsoft 21 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 18 more 2025-01-01 8.8 High
Windows SMB Witness Service Elevation of Privilege Vulnerability
CVE-2023-21542 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 7 and 10 more 2025-01-01 7 High
Windows Installer Elevation of Privilege Vulnerability
CVE-2023-21531 1 Microsoft 1 Azure Service Fabric 2025-01-01 7 High
Azure Service Fabric Container Elevation of Privilege Vulnerability
CVE-2023-21552 1 Microsoft 24 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 21 more 2025-01-01 7.8 High
Windows GDI Elevation of Privilege Vulnerability
CVE-2024-52048 1 Trendmicro 2 Apexone Op, Apexone Saas 2024-12-31 7.8 High
A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52049. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2024-52049 1 Trendmicro 2 Apexone Op, Apexone Saas 2024-12-31 7.8 High
A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52048. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.