Filtered by NVD-CWE-noinfo
Total 32313 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-43764 1 Google 1 Android 2025-07-03 7.8 High
In onPrimaryClipChanged of ClipboardListener.java, there is a possible way to partially bypass lock screen. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2025-30719 1 Oracle 1 Vm Virtualbox 2025-07-02 6.1 Medium
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H).
CVE-2025-30717 1 Oracle 1 Teleservice 2025-07-02 6.5 Medium
Vulnerability in the Oracle Teleservice product of Oracle E-Business Suite (component: Service Diagnostics Scripts). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Teleservice. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Teleservice accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
CVE-2025-30718 1 Oracle 1 Applications Framework 2025-07-02 5.4 Medium
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Attachments, File Upload). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
CVE-2025-4433 1 Devolutions 1 Devolutions Server 2025-07-02 8.8 High
Improper access control in user group management in Devolutions Server 2025.1.7.0 and earlier allows a non-administrative user with both "User Management" and "User Group Management" permissions to perform privilege escalation by adding users to groups with administrative privileges.
CVE-2023-40735 1 Butterfly-button 1 Butterfly Button 2025-07-02 7.5 High
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Cavo – Connecting for a Safer World BUTTERFLY BUTTON (Architecture flaw) allows loss of plausible deniability and confidentiality.This issue affects BUTTERFLY BUTTON: As of 2023-08-21.
CVE-2023-32002 2 Nodejs, Redhat 4 Node.js, Nodejs, Enterprise Linux and 1 more 2025-07-02 9.8 Critical
The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.
CVE-2025-5382 1 Devolutions 1 Devolutions Server 2025-07-02 6.8 Medium
Improper access control in users MFA feature in Devolutions Server 2025.1.7.0 and earlier allows a user with user management permission to remove or change administrators MFA.
CVE-2025-0691 1 Devolutions 1 Devolutions Server 2025-07-02 5 Medium
Improper access control in permissions component in Devolutions Server 2025.1.10.0 and earlier allows an authenticated user to bypass the "Edit permission" permission by bypassing the client side validation.
CVE-2025-3768 1 Devolutions 1 Devolutions Server 2025-07-02 5 Medium
Improper access control in Tor network blocking feature in Devolutions Server 2025.1.10.0 and earlier allows an authenticated user to bypass the tor blocking feature when the Devolutions hosted endpoint is not reachable.
CVE-2024-39884 2 Apache, Netapp 2 Http Server, Ontap Tools 2025-07-01 6.2 Medium
A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.   "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.61, which fixes this issue.
CVE-2025-21381 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-01 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-21386 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-01 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-21387 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-01 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-21390 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-01 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-21394 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-01 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-21392 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-07-01 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2025-21397 1 Microsoft 2 365 Apps, Office Long Term Servicing Channel 2025-07-01 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2025-27607 1 Nhairs 1 Python Json Logger 2025-07-01 8.8 High
Python JSON Logger is a JSON Formatter for Python Logging. Between 30 December 2024 and 4 March 2025 Python JSON Logger was vulnerable to RCE through a missing dependency. This occurred because msgspec-python313-pre was deleted by the owner leaving the name open to being claimed by a third party. If the package was claimed, it would allow them RCE on any Python JSON Logger user who installed the development dependencies on Python 3.13 (e.g. pip install python-json-logger[dev]). This issue has been resolved with 3.3.0.
CVE-2023-32559 2 Nodejs, Redhat 4 Node.js, Nodejs, Enterprise Linux and 1 more 2025-07-01 7.5 High
A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `process.binding('spawn_sync')` run arbitrary code, outside of the limits defined in a `policy.json` file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.