Search
Search Results (313415 CVEs found)
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-36017 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-10-08 | 8.8 High |
Windows Scripting Engine Memory Corruption Vulnerability | ||||
CVE-2023-36024 | 1 Microsoft | 1 Edge Chromium | 2025-10-08 | 7.1 High |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | ||||
CVE-2023-36034 | 1 Microsoft | 1 Edge Chromium | 2025-10-08 | 7.3 High |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | ||||
CVE-2023-36043 | 1 Microsoft | 1 System Center Operations Manager | 2025-10-08 | 6.5 Medium |
Open Management Infrastructure Information Disclosure Vulnerability | ||||
CVE-2023-36052 | 1 Microsoft | 1 Azure Command-line Interface | 2025-10-08 | 8.6 High |
Azure CLI REST Command Information Disclosure Vulnerability | ||||
CVE-2023-36410 | 1 Microsoft | 1 Dynamics 365 | 2025-10-08 | 7.6 High |
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | ||||
CVE-2023-36437 | 1 Microsoft | 1 Azure Pipelines Agent | 2025-10-08 | 8.8 High |
Azure DevOps Server Remote Code Execution Vulnerability | ||||
CVE-2023-38151 | 1 Microsoft | 2 Host Integration Server, Ole Db Provider | 2025-10-08 | 8.8 High |
Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability | ||||
CVE-2023-36423 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-10-08 | 8.8 High |
Microsoft Remote Registry Service Remote Code Execution Vulnerability | ||||
CVE-2023-36424 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-10-08 | 7.8 High |
Windows Common Log File System Driver Elevation of Privilege Vulnerability | ||||
CVE-2023-36425 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-10-08 | 8 High |
Windows Distributed File System (DFS) Remote Code Execution Vulnerability | ||||
CVE-2023-36427 | 1 Microsoft | 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more | 2025-10-08 | 7 High |
Windows Hyper-V Elevation of Privilege Vulnerability | ||||
CVE-2023-36428 | 1 Microsoft | 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more | 2025-10-08 | 5.5 Medium |
Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability | ||||
CVE-2023-36439 | 1 Microsoft | 1 Exchange Server | 2025-10-08 | 8 High |
Microsoft Exchange Server Remote Code Execution Vulnerability | ||||
CVE-2023-38177 | 1 Microsoft | 2 Sharepoint Enterprise Server, Sharepoint Server | 2025-10-08 | 6.1 Medium |
Microsoft SharePoint Server Remote Code Execution Vulnerability | ||||
CVE-2023-36036 | 1 Microsoft | 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more | 2025-10-08 | 7.8 High |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | ||||
CVE-2023-36413 | 1 Microsoft | 3 365 Apps, Office, Office Long Term Servicing Channel | 2025-10-08 | 6.5 Medium |
Microsoft Office Security Feature Bypass Vulnerability | ||||
CVE-2025-61913 | 2025-10-08 | 10 Critical | ||
Flowise is a drag & drop user interface to build a customized large language model flow. In versions prior to 3.0.8, WriteFileTool and ReadFileTool in Flowise do not restrict file path access, allowing authenticated attackers to exploit this vulnerability to read and write arbitrary files to any path in the file system, potentially leading to remote command execution. Flowise 3.0.8 fixes this vulnerability. | ||||
CVE-2025-11511 | 2025-10-08 | 6.3 Medium | ||
A flaw has been found in code-projects E-Commerce Website 1.0. Affected is an unknown function of the file /pages/supplier_add.php. Executing manipulation of the argument supp_email can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used. | ||||
CVE-2025-11509 | 2025-10-08 | 6.3 Medium | ||
A vulnerability was detected in code-projects E-Commerce Website 1.0. This impacts an unknown function of the file /pages/product_add.php. Performing manipulation of the argument prod_name results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used. |