CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service. |
An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system. |
A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview. |
Versions of the package pdfmake before 0.3.0-beta.17 are vulnerable to Allocation of Resources Without Limits or Throttling via repeatedly redirect URL in file embedding. An attacker can cause the application to crash or become unresponsive by providing crafted input that triggers this condition. |
An uninitialized variable in the HTTP CGI request arguments processing component of Vigor Routers running DrayOS may allow an attacker the ability to perform RCE on the appliance through memory corruption. |
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline. |
Considered by the maintainers a bug scenario experienced rather than a vulnerability. |
An insecure implementation of the proprietary protocol DNET in Product CGM MEDICO allows attackers within the intranet to eavesdrop and manipulate data on the protocol because encryption is optional for this connection. |
ASP.NET Core Denial of Service Vulnerability |
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability |
ASP.NET Core Security Feature Bypass Vulnerability |
Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability |
PowerShell Information Disclosure Vulnerability |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
Visual Studio Code Jupyter Extension Spoofing Vulnerability |
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Microsoft Windows Defender Elevation of Privilege Vulnerability |
Windows SmartScreen Security Feature Bypass Vulnerability |
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability |