Search

Search Results (314820 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-0287 1 Wpexperts 1 Mycred 2025-10-17 4.3 Medium
The myCred WordPress plugin before 2.4.4.1 does not have any authorisation in place in its mycred-tools-select-user AJAX action, allowing any authenticated user, such as subscriber to call and retrieve all email addresses from the blog
CVE-2024-43214 2 Mycred, Wpexperts 2 Mycred, Mycred 2025-10-17 5.3 Medium
Missing Authorization vulnerability in myCred.This issue affects myCred: from n/a through 2.7.2.
CVE-2022-1092 1 Wpexperts 1 Mycred 2025-10-17 4.3 Medium
The myCred WordPress plugin before 2.4.3.1 does not have authorisation and CSRF checks in its mycred-tools-import-export AJAX action, allowing any authenticated user to call and and retrieve the list of email address present in the blog
CVE-2025-59271 1 Microsoft 2 Azure Cache For Redis, Azure Managed Redis 2025-10-17 8.7 High
Redis Enterprise Elevation of Privilege Vulnerability
CVE-2025-59246 1 Microsoft 1 Entra Id 2025-10-17 9.8 Critical
Azure Entra ID Elevation of Privilege Vulnerability
CVE-2025-59218 1 Microsoft 1 Entra Id 2025-10-17 9.6 Critical
Azure Entra ID Elevation of Privilege Vulnerability
CVE-2025-59261 1 Microsoft 7 Windows 11 22h2, Windows 11 23h2, Windows 11 24h2 and 4 more 2025-10-17 7 High
Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
CVE-2025-59253 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-10-17 5.5 Medium
Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally.
CVE-2025-59230 1 Microsoft 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more 2025-10-17 7.8 High
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
CVE-2025-59248 2025-10-17 7.5 High
Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-59244 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-10-17 6.5 Medium
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-59227 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-10-17 7.8 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-59226 1 Microsoft 2 365 Apps, Office Long Term Servicing Channel 2025-10-17 7.8 High
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
CVE-2025-59225 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-10-17 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-59224 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-10-17 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-59223 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-10-17 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-59222 1 Microsoft 5 365 Apps, Office, Office Long Term Servicing Channel and 2 more 2025-10-17 7.8 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-59221 1 Microsoft 5 365 Apps, Office, Office Long Term Servicing Channel and 2 more 2025-10-17 7 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-59214 1 Microsoft 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more 2025-10-17 6.5 Medium
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-59213 1 Microsoft 3 Configuration Manager 2403, Configuration Manager 2409, Configuration Manager 2503 2025-10-17 8.4 High
Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an unauthorized attacker to elevate privileges locally.