Total
559 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-1755 | 1 Mongodb | 1 Compass | 2025-02-27 | 7.5 High |
MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privileges, when a crafted file is stored in C:\node_modules\. This issue affects MongoDB Compass prior to 1.42.1 | ||||
CVE-2025-1353 | 2025-02-26 | 7 High | ||
A vulnerability was found in Kong Insomnia up to 10.3.0 and classified as critical. This issue affects some unknown processing in the library profapi.dll. The manipulation leads to untrusted search path. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The real existence of this vulnerability is still doubted at the moment. The vendor is not able to reproduce the issue. | ||||
CVE-2025-21365 | 1 Microsoft | 2 365 Apps, Office | 2025-02-21 | 7.8 High |
Microsoft Office Remote Code Execution Vulnerability | ||||
CVE-2025-26624 | 2025-02-19 | N/A | ||
Rufus is a utility that helps format and create bootable USB flash drives. A DLL hijacking vulnerability in Rufus 4.6.2208 and earlier versions allows an attacker loading and executing a malicious DLL with escalated privileges (since the executable has been granted higher privileges during the time of launch) due to the ability to inject a malicious `cfgmgr32.dll` in the same directory as the executable and have it side load automatically. This is fixed in commit `74dfa49`, which will be part of version 4.7. Users are advised to upgrade as soon as version 4.7 becomes available. There are no known workarounds for this vulnerability. | ||||
CVE-2025-24830 | 2025-02-18 | N/A | ||
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378. | ||||
CVE-2025-24829 | 2025-02-18 | 6.3 Medium | ||
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378. | ||||
CVE-2025-24827 | 2025-02-18 | N/A | ||
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 39378. | ||||
CVE-2023-27759 | 1 Wondershare | 1 Edrawmind | 2025-02-14 | 7.8 High |
An issue found in Wondershare Technology Co, Ltd Edrawmind v.10.0.6 allows a remote attacker to executea arbitrary commands via the WindowsCodescs.dll file. | ||||
CVE-2023-27766 | 1 Wondershare | 1 Anireel | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co.,Ltd Anireel 1.5.4 allows a remote attacker to execute arbitrary commands via the anireel_setup_full9589.exe file. | ||||
CVE-2023-27765 | 1 Wondershare | 1 Recoverit | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co.,Ltd Recoverit v.10.6.3 allows a remote attacker to execute arbitrary commands via the recoverit_setup_full4134.exe file. | ||||
CVE-2023-27764 | 1 Wondershare | 1 Repairit | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co.,Ltd Repairit v.3.5.4 allows a remote attacker to execute arbitrary commands via the repairit_setup_full5913.exe file. | ||||
CVE-2023-27763 | 1 Wondershare | 1 Mobiletrans | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co.,Ltd MobileTrans v.4.0.2 allows a remote attacker to execute arbitrary commands via the mobiletrans_setup_full5793.exe file. | ||||
CVE-2023-27762 | 1 Wondershare | 1 Democreator | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co., Ltd DemoCreator v.6.0.0 allows a remote attacker to execute arbitrary commands via the democreator_setup_full7743.exe file. | ||||
CVE-2023-27761 | 1 Wondershare | 1 Uniconverter | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co., Ltd UniConverter v.14.0.0 allows a remote attacker to execute arbitrary commands via the uniconverter14_64bit_setup_full14204.exe file. | ||||
CVE-2023-27760 | 1 Wondershare | 1 Filmora | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co, Ltd Filmora v.12.0.9 allows a remote attacker to execute arbitrary commands via the filmora_setup_full846.exe. | ||||
CVE-2023-27771 | 1 Wondershare | 1 Creative Centerr | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co.,Ltd Creative Centerr v.1.0.8 allows a remote attacker to execute arbitrary commands via the wondershareCC_setup_full10819.exe file. | ||||
CVE-2023-27769 | 1 Wondershare | 1 Pdf Reader | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co.,Ltd PDF Reader v.1.0.1 allows a remote attacker to execute arbitrary commands via the pdfreader_setup_full13143.exe file. | ||||
CVE-2023-27768 | 1 Wondershare | 1 Pdfelement | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co.,Ltd PDFelement v9.1.1 allows a remote attacker to execute arbitrary commands via the pdfelement-pro_setup_full5239.exe file. | ||||
CVE-2023-27767 | 1 Wondershare | 1 Dr.fone | 2025-02-13 | 7.8 High |
An issue found in Wondershare Technology Co.,Ltd Dr.Fone v.12.4.9 allows a remote attacker to execute arbitrary commands via the drfone_setup_full3360.exe file. | ||||
CVE-2023-4736 | 2 Apple, Vim | 2 Macos, Vim | 2025-02-13 | 7.8 High |
Untrusted Search Path in GitHub repository vim/vim prior to 9.0.1833. |