Search Results (25202 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-3584 1 Qdrant 1 Qdrant 2025-07-10 7.5 High
qdrant/qdrant version 1.9.0-dev is vulnerable to path traversal due to improper input validation in the `/collections/{name}/snapshots/upload` endpoint. By manipulating the `name` parameter through URL encoding, an attacker can upload a file to an arbitrary location on the system, such as `/root/poc.txt`. This vulnerability allows for the writing and overwriting of arbitrary files on the server, potentially leading to a full takeover of the system. The issue is fixed in version 1.9.0.
CVE-2024-4287 1 Mintplexlabs 1 Anythingllm 2025-07-10 7.2 High
In mintplex-labs/anything-llm, a vulnerability exists due to improper input validation in the workspace update process. Specifically, the application fails to validate or format JSON data sent in an HTTP POST request to `/api/workspace/:workspace-slug/update`, allowing it to be executed as part of a database query without restrictions. This flaw enables users with a manager role to craft a request that includes nested write operations, effectively allowing them to create new Administrator accounts.
CVE-2023-24881 1 Microsoft 1 Teams 2025-07-10 6.5 Medium
Microsoft Teams Information Disclosure Vulnerability
CVE-2023-29335 1 Microsoft 15 365 Apps, Office, Windows 10 1507 and 12 more 2025-07-10 7.5 High
Microsoft Word Security Feature Bypass Vulnerability
CVE-2023-24950 1 Microsoft 2 Sharepoint Enterprise Server, Sharepoint Server 2025-07-10 6.5 Medium
Microsoft SharePoint Server Spoofing Vulnerability
CVE-2024-38167 2 Microsoft, Redhat 3 .net, Visual Studio 2022, Enterprise Linux 2025-07-10 6.5 Medium
.NET and Visual Studio Information Disclosure Vulnerability
CVE-2024-38200 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-07-10 6.5 Medium
Microsoft Office Spoofing Vulnerability
CVE-2024-29995 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-07-10 8.1 High
Windows Kerberos Elevation of Privilege Vulnerability
CVE-2024-38201 1 Microsoft 1 Azure Stack Hub 2025-07-10 7 High
Azure Stack Hub Elevation of Privilege Vulnerability
CVE-2024-38196 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-07-10 7.8 High
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2024-34365 1 Apache 1 Karaf Cave 2025-07-10 9.1 Critical
** UNSUPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Apache Karaf Cave.This issue affects all versions of Apache Karaf Cave. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2024-4321 1 Gaizhenbiao 1 Chuanhuchatgpt 2025-07-10 N/A
A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths during the chat history upload process. An attacker can exploit this vulnerability by intercepting requests and manipulating the 'name' parameter to specify arbitrary file paths. This allows the attacker to read sensitive files on the server, leading to information leakage, including API keys and private information. The issue affects version 20240310 of the application.
CVE-2018-6484 2 Canonical, Gdraheim 2 Ubuntu Linux, Zziplib 2025-07-10 N/A
In ZZIPlib 0.13.67, there is a memory alignment error and bus error in the __zzip_fetch_disk_trailer function of zzip/zip.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
CVE-2018-7726 3 Canonical, Gdraheim, Redhat 6 Ubuntu Linux, Zziplib, Enterprise Linux and 3 more 2025-07-10 N/A
An issue was discovered in ZZIPlib 0.13.68. There is a bus error caused by the __zzip_parse_root_directory function of zip.c. Attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
CVE-2018-6541 3 Canonical, Gdraheim, Redhat 3 Ubuntu Linux, Zziplib, Enterprise Linux 2025-07-10 N/A
In ZZIPlib 0.13.67, there is a bus error caused by loading of a misaligned address (when handling disk64_trailer local entries) in __zzip_fetch_disk_trailer (zzip/zip.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
CVE-2024-39925 2 Dani-garcia, Vaultwarden 2 Vaultwarden, Vaultwarden 2025-07-10 6.5 Medium
An issue was discovered in Vaultwarden (formerly Bitwarden_RS) 1.30.3. It lacks an offboarding process for members who leave an organization. As a result, the shared organization key is not rotated when a member departs. Consequently, the departing member, whose access should be revoked, retains a copy of the organization key. Additionally, the application fails to adequately protect some encrypted data stored on the server. Consequently, an authenticated user could gain unauthorized access to encrypted data of any organization, even if the user is not a member of the targeted organization. However, the user would need to know the corresponding organizationId. Hence, if a user (whose access to an organization has been revoked) already possesses the organization key, that user could use the key to decrypt the leaked data.
CVE-2024-27905 2 Apache, Apache Software Foundation 2 Aurora, Apache Aurora 2025-07-10 9.1 Critical
** UNSUPPORTED WHEN ASSIGNED ** Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Aurora. An endpoint exposing internals to unauthenticated users can be used as a "padding oracle" allowing an anonymous attacker to construct a valid authentication cookie. Potentially this could be combined with vulnerabilities in other components to achieve remote code execution. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2024-3101 1 Mintplexlabs 1 Anythingllm 2025-07-09 7.2 High
In mintplex-labs/anything-llm, an improper input validation vulnerability allows attackers to escalate privileges by deactivating 'Multi-User Mode'. By sending a specially crafted curl request with the 'multi_user_mode' parameter set to false, an attacker can deactivate 'Multi-User Mode'. This action permits the creation of a new admin user without requiring a password, leading to unauthorized administrative access.
CVE-2024-3028 1 Mintplexlabs 1 Anythingllm 2025-07-09 N/A
mintplex-labs/anything-llm is vulnerable to improper input validation, allowing attackers to read and delete arbitrary files on the server. By manipulating the 'logo_filename' parameter in the 'system-preferences' API endpoint, an attacker can construct requests to read sensitive files or the application's '.env' file, and even delete files by setting the 'logo_filename' to the path of the target file and invoking the 'remove-logo' API endpoint. This vulnerability is due to the lack of proper sanitization of user-supplied input.
CVE-2024-3029 1 Mintplexlabs 1 Anythingllm 2025-07-09 8.0 High
In mintplex-labs/anything-llm, an attacker can exploit improper input validation by sending a malformed JSON payload to the '/system/enable-multi-user' endpoint. This triggers an error that is caught by a catch block, which in turn deletes all users and disables the 'multi_user_mode'. The vulnerability allows an attacker to remove all existing users and potentially create a new admin user without requiring a password, leading to unauthorized access and control over the application.