Filtered by CWE-284
Total 4121 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-6680 2025-10-25 4.3 Medium
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.8.3. This makes it possible for authenticated attackers, with tutor-level access and above, to view assignments for courses they don't teach which may contain sensitive information.
CVE-2025-59273 1 Microsoft 2 Azure, Azure Event Grid System 2025-10-25 7.3 High
Improper access control in Azure Event Grid allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-59500 1 Microsoft 2 Azure, Azure Notification Service 2025-10-25 7.7 High
Improper access control in Azure Notification Service allows an authorized attacker to elevate privileges over a network.
CVE-2025-59218 1 Microsoft 1 Entra Id 2025-10-24 9.6 Critical
Azure Entra ID Elevation of Privilege Vulnerability
CVE-2025-59253 1 Microsoft 20 Windows, Windows 10, Windows 10 1507 and 17 more 2025-10-24 5.5 Medium
Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally.
CVE-2025-59230 1 Microsoft 21 Remote, Windows, Windows 10 and 18 more 2025-10-24 7.8 High
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
CVE-2025-58726 1 Microsoft 10 Windows, Windows 10, Windows 11 and 7 more 2025-10-24 7.5 High
Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network.
CVE-2025-58724 1 Microsoft 5 Azure, Azure Agent, Azure Arc and 2 more 2025-10-24 7.8 High
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2025-58714 1 Microsoft 10 Windows, Windows 10, Windows 11 and 7 more 2025-10-24 7.8 High
Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2025-55694 1 Microsoft 5 Windows, Windows 11, Windows Server and 2 more 2025-10-24 7.8 High
Improper access control in Windows Error Reporting allows an authorized attacker to elevate privileges locally.
CVE-2025-55240 1 Microsoft 4 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 1 more 2025-10-24 7.3 High
Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.
CVE-2025-25004 1 Microsoft 21 Powershell, Windows, Windows 10 and 18 more 2025-10-24 7.3 High
Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.
CVE-2025-59494 1 Microsoft 2 Azure, Azure Monitor Agent 2025-10-24 7.8 High
Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
CVE-2025-59201 1 Microsoft 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more 2025-10-24 7.8 High
Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally.
CVE-2025-59199 2025-10-24 7.8 High
Improper access control in Software Protection Platform (SPP) allows an authorized attacker to elevate privileges locally.
CVE-2025-47989 1 Microsoft 2 Azure, Azure Connected Machine Agent 2025-10-24 7 High
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.
CVE-2023-23752 1 Joomla 1 Joomla\! 2025-10-24 5.3 Medium
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
CVE-2025-53071 1 Oracle 1 Applications Framework 2025-10-24 4.3 Medium
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Upload Attachments). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
CVE-2025-61749 1 Oracle 1 Database Server 2025-10-24 2.7 Low
Vulnerability in the Unified Audit component of Oracle Database Server. Supported versions that are affected are 23.4-23.9. Easily exploitable vulnerability allows high privileged attacker having DBA privilege with network access via Oracle Net to compromise Unified Audit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Unified Audit accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
CVE-2025-61881 1 Oracle 4 Database, Database Server, Java Virtual Machine and 1 more 2025-10-24 5.9 Medium
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.28, 21.3-21.19 and 23.4-23.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).