CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
A vulnerability has been found in fcba_zzm ics-park Smart Park Management System 2.0. Affected is an unknown function of the file ruoyi-quartz/src/main/java/com/ruoyi/quartz/controller/JobController.java of the component Scheduled Task Module. Such manipulation leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. |
A security flaw has been discovered in fcba_zzm ics-park Smart Park Management System 2.0. This vulnerability affects unknown code of the file FileUploadUtils.java. The manipulation of the argument File results in unrestricted upload. The attack can be launched remotely. The exploit has been released to the public and may be exploited. |
A vulnerability has been found in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. Affected by this issue is some unknown functionality of the file /assets/uploadSllyabus.php. Such manipulation of the argument File leads to unrestricted upload. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. |
Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges over a network. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network. |
Improper input validation in JDBC Driver for SQL Server allows an unauthorized attacker to perform spoofing over a network. |
Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. |
Use of a key past its expiration date in Virtual Secure Mode allows an authorized attacker to perform spoofing locally. |
Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally. |
Reliance on untrusted inputs in a security decision in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally. |
Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. |
Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally. |
A vulnerability classified as problematic was found in lenve VBlog up to 1.0.0. Affected by this vulnerability is the function addNewArticle of the file blogserver/src/main/java/org/sang/service/ArticleService.java. The manipulation of the argument mdContent/htmlContent leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
Use after free in Xbox allows an authorized attacker to elevate privileges locally. |
Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Kernel allows an unauthorized attacker to elevate privileges locally. |