CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
An issue was discovered in Stormshield Network Security (SNS) before 5.0.1. TPM authentication information could, in some HA use cases, be shared among administrators, which can cause secret sharing. |
External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally. |
Cross Site Scripting vulnerability in petstore v.1.0.7 allows a remote attacker to execute arbitrary code via a crafted script to the /api/v3/pet |
An issue in petstore v.1.0.7 allows a remote attacker to execute arbitrary code via accessing a non-existent endpoint/cart, the server returns a 404-error page exposing sensitive information including the Servlet name (default) and server version |
An issue was discovered in the method push.lite.avtech.com.MySSLSocketFactoryNew.checkServerTrusted in AVTECH EagleEyes 2.0.0. The custom X509TrustManager used in checkServerTrusted only checks the certificate's expiration date, skipping proper TLS chain validation. |
A vulnerability has been found in fcba_zzm ics-park Smart Park Management System 2.0. Affected is an unknown function of the file ruoyi-quartz/src/main/java/com/ruoyi/quartz/controller/JobController.java of the component Scheduled Task Module. Such manipulation leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. |
A security flaw has been discovered in fcba_zzm ics-park Smart Park Management System 2.0. This vulnerability affects unknown code of the file FileUploadUtils.java. The manipulation of the argument File results in unrestricted upload. The attack can be launched remotely. The exploit has been released to the public and may be exploited. |
A vulnerability has been found in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. Affected by this issue is some unknown functionality of the file /assets/uploadSllyabus.php. Such manipulation of the argument File leads to unrestricted upload. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. |
Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges over a network. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network. |
Improper input validation in JDBC Driver for SQL Server allows an unauthorized attacker to perform spoofing over a network. |
Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. |
Use of a key past its expiration date in Virtual Secure Mode allows an authorized attacker to perform spoofing locally. |
Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally. |
Reliance on untrusted inputs in a security decision in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally. |
Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. |