| CVE | Vendors | Products | Updated | CVSS v3.1 | 
        | FutureNet MA and IP-K series provided by Century Systems Co., Ltd. put the firmware version and the garbage collection information on the internal web page. With some crafted HTTP request, they can be accessed without authentication. | 
    
    
    
        | A vulnerability has been found in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. Affected by this vulnerability is the function Download of the file /Service.do?Action=Download. Such manipulation of the argument Path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | 
    
    
    
        | The Qzzr Shortcode Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'qzzr' shortcode in all versions up to, and including, 1.0.1. This is due to insufficient input sanitization and output escaping on the 'quiz' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 
    
    
    
        | A vulnerability was found in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. Affected by this issue is the function Download of the file /DeviceFileReport.do?Action=Download. Performing manipulation of the argument FilePath results in path traversal. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. | 
    
    
    
        | Some payload elements of the messages sent between two stations in a networking architecture are not properly checked on the receiving station allowing an attacker to execute unauthorized commands in the application. | 
    
    
    
        | The sequence of packets received by a Networking server are not correctly checked.
An attacker could exploit this vulnerability to send specially crafted messages to force the application to stop. | 
    
    
    
        | QLowEnergyController in Qt before 6.8.2 mishandles malformed Bluetooth ATT commands, leading to an out-of-bounds read (or division by zero). This is fixed in 5.15.19, 6.5.9, and 6.8.2. | 
    
    
    
        | Improper access control in Azure Notification Service allows an authorized attacker to elevate privileges over a network. | 
    
    
    
        | Improper access control in Azure Event Grid allows an unauthorized attacker to elevate privileges over a network. | 
    
    
    
        | Copilot Spoofing Vulnerability | 
    
    
    
        | Improper neutralization of input during web page generation ('cross-site scripting') in Azure Monitor allows an unauthorized attacker to perform spoofing over a network. | 
    
    
    
        | Copilot Spoofing Vulnerability | 
    
    
    
        | Redis Enterprise Elevation of Privilege Vulnerability | 
    
    
    
        | M365 Copilot Spoofing Vulnerability | 
    
    
    
        | Azure PlayFab Elevation of Privilege Vulnerability | 
    
    
    
        | Azure Entra ID Elevation of Privilege Vulnerability | 
    
    
    
        | Azure Entra ID Elevation of Privilege Vulnerability | 
    
    
    
        | Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally. | 
    
    
    
        | Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 
    
    
    
        | Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network. |