Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-4435

Description: When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
June 3rd, 2025 (5 days ago)

CVE-2025-4330

Description: Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.

CVSS: HIGH (7.5)

EPSS Score: 0.06%

Source: CVE
June 3rd, 2025 (5 days ago)

CVE-2025-4138

Description: Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.

CVSS: HIGH (7.5)

EPSS Score: 0.09%

Source: CVE
June 3rd, 2025 (5 days ago)

CVE-2025-4392

Description: The Shared Files – Frontend File Upload Form & Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via html File uploads in all versions up to, and including, 1.7.48 due to insufficient input sanitization and output escaping within the sanitize_file() function. This makes it possible for unauthenticated attackers to bypass the plugin’s MIME-only checks and inject arbitrary web scripts in pages that will execute whenever a user accesses the html file.

CVSS: HIGH (7.2)

EPSS Score: 0.11%

Source: CVE
June 3rd, 2025 (5 days ago)

CVE-2025-31359

Description: A directory traversal vulnerability exists in the PVMP package unpacking functionality of Parallels Desktop for Mac version 20.2.2 (55879). This vulnerability can be exploited by an attacker to write to arbitrary files, potentially leading to privilege escalation.

CVSS: HIGH (8.8)

EPSS Score: 0.05%

Source: CVE
June 3rd, 2025 (5 days ago)

CVE-2024-54189

Description: A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation.

CVSS: HIGH (7.8)

EPSS Score: 0.02%

Source: CVE
June 3rd, 2025 (5 days ago)

CVE-2024-52561

Description: A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is deleted, a root service verifies and modifies the ownership of the snapshot files. By using a symlink, an attacker can change the ownership of files owned by root to a lower-privilege user, potentially leading to privilege escalation.

CVSS: HIGH (7.8)

EPSS Score: 0.01%

Source: CVE
June 3rd, 2025 (5 days ago)

CVE-2024-36486

Description: A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbitrary file, potentially resulting in privilege escalation.

CVSS: HIGH (7.8)

EPSS Score: 0.02%

Source: CVE
June 3rd, 2025 (5 days ago)

CVE-2025-46355

Description: Incorrect default permissions issue in PC Time Tracer prior to 5.2. If exploited, arbitrary code may be executed with SYSTEM privilege on Windows system where the product is running by a local authenticated attacker.

CVSS: HIGH (7.3)

EPSS Score: 0.01%

Source: CVE
June 3rd, 2025 (5 days ago)

CVE-2025-21479

🚨 Marked as known exploited on June 3rd, 2025 (4 days ago).
Description: Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.

CVSS: HIGH (8.6)

EPSS Score: 3.15%

Source: CVE
June 3rd, 2025 (5 days ago)