CVE Database

Comprehensive vulnerability intelligence with advanced analytics

7.8

Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

Published: May 13, 2025
Modified: Oct 27, 2025
Product: microsoft windows_10_1507
EPSS: 1.30%
View Details
7.8

Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

Published: May 13, 2025
Modified: Oct 27, 2025
Product: microsoft windows_10_1507
EPSS: 1.54%
View Details
7.8

Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.

Published: May 13, 2025
Modified: Oct 27, 2025
Product: microsoft windows_server_2019
EPSS: 1.13%
View Details
9.8

CVE-2025-32756

Critical KEV

A stack-based buffer overflow vulnerability [CWE-121] vulnerability in Fortinet FortiCamera 2.1.0 through 2.1.3, FortiCamera 2.0 all versions, FortiCamera 1.1 all versions, FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.7, FortiNDR 7.2.0 through 7.2.4, FortiNDR 7.0.0 through…

Published: May 13, 2025
Modified: Jan 14, 2026
Product: fortinet fortimail
EPSS: 13.78%
View Details
5.3

CVE-2025-35939

Medium KEV

Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at '/var/lib/php/sessions'. Such session files are named…

Published: May 07, 2025
Modified: Oct 24, 2025
Product: craftcms craft_cms
EPSS: 16.71%
View Details
9.3

CVE-2025-2776

Critical KEV

SysAid On-Prem versions

Published: May 07, 2025
Modified: Oct 27, 2025
Product: sysaid sysaid
EPSS: 50.93%
View Details
9.3

CVE-2025-2775

Critical KEV

SysAid On-Prem versions

Published: May 07, 2025
Modified: Oct 27, 2025
Product: sysaid sysaid
EPSS: 65.19%
View Details
7.2

Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.

Published: May 05, 2025
Modified: Nov 05, 2025
EPSS: 46.08%
View Details
8.1

ScreenConnect versions 25.2.3 and earlier versions may be susceptible to a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys.  It is important to note that to obtain these machine keys, privileged system level access…

Published: Apr 25, 2025
Modified: Oct 24, 2025
Product: connectwise screenconnect
EPSS: 12.30%
View Details
8.8

Commvault Web Server has an unspecified vulnerability that can be exploited by a remote, authenticated attacker. According to the Commvault advisory: "Webservers can be compromised through bad actors creating and executing webshells." Fixed in version 11.36.46, 11.32.89, 11.28.141, and 11.20.217 for Windows and Linux platforms. This vulnerability was added to…

Published: Apr 25, 2025
Modified: Oct 31, 2025
Product: commvault commvault
EPSS: 13.12%
View Details
10.0

CVE-2025-31324

Critical KEV

SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.

Published: Apr 24, 2025
Modified: Oct 31, 2025
Product: sap netweaver
EPSS: 38.73%
View Details
6.7

CVE-2025-1976

Medium KEV

Brocade Fabric OS versions starting with 9.1.0 have root access removed, however, a local user with admin privilege can potentially execute arbitrary code with full root privileges on Fabric OS versions 9.1.0 through 9.1.1d6.

Published: Apr 24, 2025
Modified: Oct 24, 2025
Product: broadcom fabric_operating_system
EPSS: 0.71%
View Details
10.0

CVE-2025-34028

Critical KEV

The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to…

Published: Apr 22, 2025
Modified: Nov 06, 2025
Product: commvault commvault
EPSS: 45.93%
View Details
10.0

CVE-2025-32433

Critical KEV

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected…

Published: Apr 16, 2025
Modified: Nov 04, 2025
Product: cisco confd_basic
EPSS: 43.92%
View Details
9.8

CVE-2025-31201

Critical KEV

This issue was addressed by removing the vulnerable code. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. Apple is aware of a report that this…

Published: Apr 16, 2025
Modified: Nov 25, 2025
Product: apple ipados
EPSS: 4.38%
View Details
9.8

CVE-2025-31200

Critical KEV

A memory corruption issue was addressed with improved bounds checking. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that…

Published: Apr 16, 2025
Modified: Nov 25, 2025
Product: apple ipados
EPSS: 1.73%
View Details
9.0

CVE-2024-58136

Critical KEV

Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.

Published: Apr 10, 2025
Modified: Nov 05, 2025
Product: yiiframework yii
EPSS: 78.44%
View Details
7.8

Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

Published: Apr 08, 2025
Modified: Oct 27, 2025
Product: microsoft windows_10_1507
EPSS: 0.67%
View Details
9.0

CVE-2025-30406

Critical KEV

Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, as exploited in the wild in March 2025. This enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: a CentreStack…

Published: Apr 03, 2025
Modified: Nov 05, 2025
Product: gladinet centrestack
EPSS: 86.81%
View Details
9.0

CVE-2025-22457

Critical KEV

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, Ivanti Policy Secure before version 22.7R1.4, and Ivanti ZTA Gateways before version 22.8R2.2 allows a remote unauthenticated attacker to achieve remote code execution.

Published: Apr 03, 2025
Modified: Oct 24, 2025
Product: ivanti policy_secure
EPSS: 49.13%
View Details
9.8

CVE-2025-2747

Critical KEV

An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server component password handling for the server defined None type. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.178.

Published: Mar 24, 2025
Modified: Nov 06, 2025
Product: kentico xperience
EPSS: 88.93%
View Details
9.8

CVE-2025-2746

Critical KEV

An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server password handling of empty SHA1 usernames in digest authentication. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.172.

Published: Mar 24, 2025
Modified: Nov 06, 2025
Product: kentico xperience
EPSS: 87.41%
View Details
8.6

reviewdog/action-setup is a GitHub action that installs reviewdog. reviewdog/action-setup@v1 was compromised March 11, 2025, between 18:42 and 20:31 UTC, with malicious code added that dumps exposed secrets to Github Actions Workflow Logs. Other reviewdog actions that use `reviewdog/action-setup@v1` that would also be compromised, regardless of version or pinning method, are…

Published: Mar 19, 2025
Modified: Oct 24, 2025
Product: reviewdog action-setup
EPSS: 17.94%
View Details
8.6

tj-actions changed-files before 46 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were affected on 2025-03-14 and 2025-03-15 because they were modified by a threat actor to point at commit 0e58ed8, which contained malicious updateFeatures code.)

Published: Mar 15, 2025
Modified: Nov 05, 2025
Product: tj-actions changed-files
EPSS: 90.88%
View Details