CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
The myCred WordPress plugin before 2.4.4.1 does not have any authorisation in place in its mycred-tools-select-user AJAX action, allowing any authenticated user, such as subscriber to call and retrieve all email addresses from the blog |
Missing Authorization vulnerability in myCred.This issue affects myCred: from n/a through 2.7.2. |
The myCred WordPress plugin before 2.4.3.1 does not have authorisation and CSRF checks in its mycred-tools-import-export AJAX action, allowing any authenticated user to call and and retrieve the list of email address present in the blog |
Redis Enterprise Elevation of Privilege Vulnerability |
Azure Entra ID Elevation of Privilege Vulnerability |
Azure Entra ID Elevation of Privilege Vulnerability |
Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally. |
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. |
Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. |
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. |
Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an unauthorized attacker to elevate privileges locally. |