CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
Open Management Infrastructure Information Disclosure Vulnerability |
Azure CLI REST Command Information Disclosure Vulnerability |
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Azure DevOps Server Remote Code Execution Vulnerability |
Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability |
Microsoft Remote Registry Service Remote Code Execution Vulnerability |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Windows Distributed File System (DFS) Remote Code Execution Vulnerability |
Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability |
Microsoft Exchange Server Remote Code Execution Vulnerability |
Microsoft SharePoint Server Remote Code Execution Vulnerability |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
Microsoft Office Security Feature Bypass Vulnerability |
Flowise is a drag & drop user interface to build a customized large language model flow. In versions prior to 3.0.8, WriteFileTool and ReadFileTool in Flowise do not restrict file path access, allowing authenticated attackers to exploit this vulnerability to read and write arbitrary files to any path in the file system, potentially leading to remote command execution. Flowise 3.0.8 fixes this vulnerability. |
A flaw has been found in code-projects E-Commerce Website 1.0. Affected is an unknown function of the file /pages/supplier_add.php. Executing manipulation of the argument supp_email can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used. |
A vulnerability was detected in code-projects E-Commerce Website 1.0. This impacts an unknown function of the file /pages/product_add.php. Performing manipulation of the argument prod_name results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used. |
A security vulnerability has been detected in code-projects Voting System 1.0. This affects an unknown function of the file /admin/voters_add.php. Such manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. |
MongoDB Connector for BI installation via MSI on Windows leaves ACLs unset on custom install directories allows Privilege Escalation.This issue affects MongoDB Connector for BI: from 2.0.0 through 2.14.24. |