Search Results (7470 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-29043 1 Liferay 3 Digital Experience Platform, Dxp, Liferay Portal 2025-05-13 5.9 Medium
The Portal Store module in Liferay Portal 7.0.0 through 7.3.5, and Liferay DXP 7.0 before fix pack 97, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 1 does not obfuscate the S3 store's proxy password, which allows attackers to steal the proxy password via man-in-the-middle attacks or shoulder surfing.
CVE-2020-15842 1 Liferay 2 Digital Experience Platform, Liferay Portal 2025-05-13 8.1 High
Liferay Portal before 7.3.0, and Liferay DXP 7.0 before fix pack 90, 7.1 before fix pack 17, and 7.2 before fix pack 5, allows man-in-the-middle attackers to execute arbitrary code via crafted serialized payloads, because of insecure deserialization.
CVE-2024-49128 1 Microsoft 6 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 3 more 2025-05-13 8.1 High
Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
CVE-2022-3293 1 Gitlab 1 Gitlab 2025-05-13 3.5 Low
Email addresses were leaked in WebHook logs in GitLab EE affecting all versions from 9.3 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1
CVE-2022-3291 1 Gitlab 1 Gitlab 2025-05-13 6.5 Medium
Serialization of sensitive data in GitLab EE affecting all versions from 14.9 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 can leak sensitive information via cache
CVE-2024-49095 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2025-05-13 7 High
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2024-49063 1 Microsoft 1 Muzic 2025-05-13 8.4 High
Microsoft/Muzic Remote Code Execution Vulnerability
CVE-2024-49147 1 Microsoft 1 Update Catalog 2025-05-13 9.3 Critical
Deserialization of untrusted data in Microsoft Update Catalog allows an unauthorized attacker to elevate privileges on the website’s webserver.
CVE-2024-49132 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2025-05-13 8.1 High
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2024-49126 1 Microsoft 15 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 12 more 2025-05-13 8.1 High
Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
CVE-2024-49123 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2025-05-13 8.1 High
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2024-49115 1 Microsoft 5 Windows Server 2016, Windows Server 2019, Windows Server 2022 and 2 more 2025-05-13 8.1 High
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2024-49108 1 Microsoft 5 Windows Server 2016, Windows Server 2019, Windows Server 2022 and 2 more 2025-05-13 8.1 High
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2024-49107 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-05-13 7.3 High
WmsRepair Service Elevation of Privilege Vulnerability
CVE-2024-49106 1 Microsoft 5 Windows Server 2016, Windows Server 2019, Windows Server 2022 and 2 more 2025-05-13 8.1 High
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2024-49097 1 Microsoft 10 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 7 more 2025-05-13 7 High
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2024-49091 1 Microsoft 6 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 3 more 2025-05-13 7.2 High
Windows Domain Name Service Remote Code Execution Vulnerability
CVE-2024-49070 1 Microsoft 1 Sharepoint Server 2025-05-13 7.4 High
Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2024-49059 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-05-13 7 High
Microsoft Office Elevation of Privilege Vulnerability
CVE-2025-31120 1 Namelessmc 1 Nameless 2025-05-13 5.3 Medium
NamelessMC is a free, easy to use & powerful website software for Minecraft servers. In version 2.1.4 and prior, an insecure view count mechanism in the forum page allows an unauthenticated attacker to artificially increase the view count. The application relies on a client-side cookie (nl-topic-[tid]) (or session variable for guests) to determine if a view should be counted. When a client does not provide the cookie, every page request increments the counter, leading to incorrect view metrics. This issue has been patched in version 2.2.0.