CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
An unauthenticated remote attacker (MITM) can intercept the websocket messages to gain access to the login credentials for the Webfrontend. |
The webserver is vulnerable to a denial of service condition. An unauthenticated remote attacker can craft a special GET request with an over-long content-length to trigger the issue without affecting the core functionality. |
A vulnerability classified as critical has been found in lenve VBlog up to 1.0.0. Affected is the function uploadImg of the file blogserver/src/main/java/org/sang/controller/ArticleController.java. The manipulation of the argument filename leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
A vulnerability classified as critical has been found in Arris VAP2500 08.50. This affects an unknown part of the file /tools_command.php. The manipulation of the argument cmb_header/txt_command leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265833 was assigned to this vulnerability. |
A path traversal vulnerability in FastX3 thru 3.3.67 allows an unauthenticated attacker to read arbitrary files on the server. By leveraging this vulnerability, it is possible to access the application's configuration files, which contain the secret key used to sign JSON Web Tokens as well as existing JTIs. With this information, an attacker can forge valid JWTs, impersonate the root user, and achieve remote code execution in privileged context via authenticated endpoints. |
Use of uninitialized resource in Windows Management Services allows an authorized attacker to disclose information locally. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Data Sharing Service Client allows an unauthorized attacker to perform spoofing locally. |
Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally. |
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. |
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. |
Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network. |
Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally. |
Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally. |
Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. |
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. |
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally. |