7.3

CVSS3.1

CVE-2025-32780 - BleachBit for Windows Has DLL Untrusted Path Vulnerability

BleachBit cleans files to free disk space and to maintain privacy. BleachBit for Windows up to version 4.6.2 is vulnerable to a DLL Hijacking vulnerability. By placing a malicious DLL with the name uuid.dll in the folder C:\Users\<username>\AppData\Local\Microsoft\WindowsApps\, an attacker can exec…

📅 Published: April 15, 2025, 4:32 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.5

CVSS3.1

CVE-2025-32779 - labsai/eddi Vulnerable to Path Traversal (Zip Slip) in ZIP Import Function

E.D.D.I (Enhanced Dialog Driven Interface) is a middleware to connect and manage LLM API bots. In versions before 5.5.0, an attacker with access to the `/backup/import` API endpoint can write arbitrary files to locations outside the intended extraction directory due to a Zip Slip vulnerability. Alt…

📅 Published: April 15, 2025, 4:32 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

5.5

CVSS3.1

CVE-2025-32776 - OpenRazer Vulnerable to Out of Bounds Read

OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. By writing specially crafted data to the `matrix_custom_frame` file, an attacker can cause the custom kernel driver to read more bytes than provided by user space. This data wi…

📅 Published: April 15, 2025, 4:32 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

5.7

CVSS3.1

CVE-2025-29817 - Microsoft Power Automate Desktop Information Disclosure Vulnerability

Uncontrolled search path element in Power Automate allows an authorized attacker to disclose information over a network.

📅 Published: April 15, 2025, 4:10 p.m. 🔄 Last Modified: Feb. 13, 2026, 7:32 p.m.

6.3

CVSS4.0

CVE-2024-11084 - Potential Username Enumeration in Helix ALM

Helix ALM prior to 2025.1 returns distinct error responses during authentication, allowing an attacker to determine whether a username exists.

📅 Published: April 15, 2025, 3:34 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

5.2

CVSS4.0

CVE-2024-13177 - Symlink Following in Netskope Client Postinstall Script

Netskope Client on Mac OS is impacted by a vulnerability in which the postinstall script does not properly validate the path of the file “nsinstallation”. A standard user could potentially create a symlink of the file “nsinstallation” to escalate the privileges of a different file on the system. T…

📅 Published: April 15, 2025, 3:21 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.4

CVSS3.1

CVE-2025-3523 - User Interface (UI) Misrepresentation of attachment URL

When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untr…

📅 Published: April 15, 2025, 3:06 p.m. 🔄 Last Modified: April 13, 2026, 2:28 p.m.

6.3

CVSS3.1

CVE-2025-3522 - Leak of hashed Window credentials via crafted attachment URL

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated…

📅 Published: April 15, 2025, 3:06 p.m. 🔄 Last Modified: April 13, 2026, 2:28 p.m.

6.3

CVSS3.1

CVE-2025-2830 - Information Disclosure of /tmp directory listing

By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the vict…

📅 Published: April 15, 2025, 3:06 p.m. 🔄 Last Modified: April 13, 2026, 2:28 p.m.

6.5

CVSS3.1

CVE-2025-32949 - PeerTube User Import Authenticated Resource Exhaustion

This vulnerability allows any authenticated user to cause the server to consume very large amounts of disk space when extracting a Zip Bomb. If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for readi…

📅 Published: April 15, 2025, 2:57 p.m. 🔄 Last Modified: Oct. 21, 2025, 4:25 p.m.
Total resulsts: 344963
Page 5457 of 34,497
« previous page » next page
Filters