ZDI-25-293: Microsoft Windows Installer Service Link Following Information Disclosure Vulnerability
Zero Day Initiative Advisories (published)
2025-05-21 13:00:00
收藏
This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.1. The following CVEs are assigned: CVE-2025-29837.
目录
最新
- ZDI-25-414: Ruby WEBrick read_header HTTP Request Smuggling Vulnerability
- ZDI-25-415: ServiceStack GetErrorResponse Improper Input Validation NTLM Relay Vulnerability
- ZDI-25-416: ServiceStack FindType Directory Traversal Remote Code Execution Vulnerability
- ZDI-25-411: Delta Electronics CNCSoft-G2 DPAX File Parsing Memory Corruption Remote Code Execution Vulnerability
- ZDI-25-412: Fuji Electric Smart Editor X1 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
- ZDI-25-413: Fuji Electric Smart Editor TL5 File Parsing Stack-Based Buffer Overflow Remote Code Execution Vulnerability
- ZDI-25-409: RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability
- ZDI-25-410: Allegra calculateTokenExpDate Password Recovery Authentication Bypass Vulnerability