CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
An incorrect OIDC authentication flow in Claroty Secure Access 3.3.0 through 4.0.2 can result in unauthorized user creation or impersonation of existing OIDC users. |
Incorrect implementation of authentication algorithm in Microsoft Exchange Server allows an unauthorized attacker to elevate privileges locally. |
Use after free in Xbox allows an authorized attacker to elevate privileges locally. |
Reliance on untrusted inputs in a security decision in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. |
Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally. |
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Device Association Broker service allows an authorized attacker to elevate privileges locally. |
Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally. |
Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges over a network. |
Use of a key past its expiration date in Virtual Secure Mode allows an authorized attacker to perform spoofing locally. |
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally. |
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally. |
Insertion of sensitive information into log file in Windows Failover Cluster allows an authorized attacker to disclose information locally. |
A vulnerability in the parsing of ethernet frames in AOS-8 Instant and AOS 10 could allow an unauthenticated remote attacker to conduct a denial of service attack. Successful exploitation could allow an attacker to potentially disrupt network services and require manual intervention to restore functionality. |
A Secure Boot Bypass Vulnerability exists in affected Access Points that allows an adversary to bypass the hardware root of trust verification in place to ensure only vendor-signed firmware can execute on the device. An adversary can exploit this vulnerability to run modified or custom firmware on affected Access Points. |
A vulnerability in the web-based management interface of network access point configuration services could allow an authenticated remote attacker to perform remote command execution. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system. |
Arbitrary file download vulnerabilities exist in a low-level interface library in AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits. |
Arbitrary file download vulnerabilities exist in a low-level interface library in AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits. |
An arbitrary file download vulnerability exists in the web-based management interface of AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an Authenticated malicious actor to download arbitrary files through carefully constructed exploits. |