Total
32233 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-30062 | 1 Microsoft | 4 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 1 more | 2025-07-16 | 7.8 High |
Windows Standards-Based Storage Management Service Remote Code Execution Vulnerability | ||||
CVE-2024-38082 | 1 Microsoft | 1 Edge | 2025-07-16 | 4.7 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2024-38093 | 1 Microsoft | 1 Edge | 2025-07-16 | 4.3 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2024-30082 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-07-16 | 7.8 High |
Win32k Elevation of Privilege Vulnerability | ||||
CVE-2024-30078 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-07-16 | 8.8 High |
Windows Wi-Fi Driver Remote Code Execution Vulnerability | ||||
CVE-2024-30077 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-07-16 | 8 High |
Windows OLE Remote Code Execution Vulnerability | ||||
CVE-2024-30076 | 1 Microsoft | 11 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 8 more | 2025-07-16 | 6.8 Medium |
Windows Container Manager Service Elevation of Privilege Vulnerability | ||||
CVE-2024-30075 | 1 Microsoft | 1 Windows Server 2008 | 2025-07-16 | 8 High |
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability | ||||
CVE-2024-30074 | 1 Microsoft | 1 Windows Server 2008 | 2025-07-16 | 8 High |
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability | ||||
CVE-2024-30072 | 1 Microsoft | 3 Windows 11 22h2, Windows 11 23h2, Windows Server 2022 23h2 | 2025-07-16 | 7.8 High |
Microsoft Event Trace Log File Parsing Remote Code Execution Vulnerability | ||||
CVE-2024-30070 | 1 Microsoft | 3 Windows Server 2012, Windows Server 2016, Windows Server 2019 | 2025-07-16 | 7.5 High |
DHCP Server Service Denial of Service Vulnerability | ||||
CVE-2025-31672 | 2 Apache, Netapp | 2 Poi, Active Iq Unified Manager | 2025-07-15 | 5.3 Medium |
Improper Input Validation vulnerability in Apache POI. The issue affects the parsing of OOXML format files like xlsx, docx and pptx. These file formats are basically zip files and it is possible for malicious users to add zip entries with duplicate names (including the path) in the zip. In this case, products reading the affected file could read different data because 1 of the zip entries with the duplicate name is selected over another but different products may choose a different zip entry. This issue affects Apache POI poi-ooxml before 5.4.0. poi-ooxml 5.4.0 has a check that throws an exception if zip entries with duplicate file names are found in the input file. Users are recommended to upgrade to version poi-ooxml 5.4.0, which fixes the issue. Please read https://poi.apache.org/security.html for recommendations about how to use the POI libraries securely. | ||||
CVE-2020-17163 | 1 Microsoft | 2 Python, Visual Studio Code | 2025-07-15 | 7.8 High |
Visual Studio Code Python Extension Remote Code Execution Vulnerability | ||||
CVE-2024-49050 | 1 Microsoft | 1 Python | 2025-07-15 | 8.8 High |
Visual Studio Code Python Extension Remote Code Execution Vulnerability | ||||
CVE-2025-43559 | 1 Adobe | 1 Coldfusion | 2025-07-15 | 9.1 Critical |
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. A high-privileged attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed. | ||||
CVE-2025-43563 | 1 Adobe | 1 Coldfusion | 2025-07-15 | 9.1 Critical |
ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. A high-privileged attacker could leverage this vulnerability to access or modify sensitive data without proper authorization. Exploitation of this issue does not require user interaction, and scope is changed. | ||||
CVE-2025-30281 | 1 Adobe | 1 Coldfusion | 2025-07-15 | 9.1 Critical |
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary code execution. A high-privileged attacker could leverage this vulnerability to access or modify sensitive data without proper authorization. Exploitation of this issue does not require user interaction, and scope is changed. | ||||
CVE-2025-3067 | 1 Google | 2 Android, Chrome | 2025-07-15 | 8.8 High |
Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform privilege escalation via a crafted app. (Chromium security severity: Medium) | ||||
CVE-2024-1968 | 1 Scrapy | 1 Scrapy | 2025-07-15 | N/A |
In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware. | ||||
CVE-2024-8613 | 1 Gaizhenbiao | 1 Chuanhuchatgpt | 2025-07-15 | 8.8 High |
A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240802 allows attackers to access, copy, and delete other users' chat histories. This issue arises due to improper handling of session data and lack of access control mechanisms, enabling attackers to view and manipulate chat histories of other users. |