| CVE | Vendors | Products | Updated | CVSS v3.1 | 
        | TRUfusion Enterprise through 7.10.4.0 exposes the encrypted COOKIEID as an authentication mechanism for some endpoints such as /trufusionPortal/getProjectList. However, the application uses a static key to create the encrypted cookie, ultimately allowing anyone to forge cookies and gain access to sensitive internal information. | 
    
    
    
        | TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/fileupload endpoint to upload files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to write to any filename with any file type at any location on the local server, ultimately allowing execution of arbitrary code. | 
    
    
    
        | TRUfusion Enterprise through 7.10.4.0 exposes the /trufusionPortal/jsp/internal_admin_contact_login.jsp endpoint to unauthenticated users. This endpoint discloses sensitive internal information including PII to unauthenticated attackers. | 
    
    
    
        | An issue was discovered in BAE SOCET GXP before 4.6.0.3. It permits external entities in certain XML-based files. An attacker who is able to social engineer a SOCET GXP user into opening a malicious file can trigger a variety of outbound requests, potentially compromising sensitive information in the process. | 
    
    
    
        | An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Service does not require authentication. In some configurations, this may allow remote users to submit jobs, or local users to submit jobs that will execute with the permissions of other users. | 
    
    
    
        | An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Status Service does not implement CSRF protections. An attacker who social engineers a valid user into clicking a malicious link or visiting a malicious website may be able to submit requests to the Job Status Service without the user's knowledge. | 
    
    
    
        | An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Status Service fails to authenticate requests. In some configurations, this may allow remote or local users to abort jobs or read information without the permissions of the job owner. | 
    
    
    
        | Protection mechanism failure in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network. | 
    
    
    
        | Authentication bypass by spoofing in Microsoft Configuration Manager allows an authorized attacker to perform spoofing over an adjacent network. | 
    
    
    
        | Improper access control in Azure Notification Service allows an authorized attacker to elevate privileges over a network. | 
    
    
    
        | Server-side request forgery (ssrf) in Azure Compute Gallery allows an unauthorized attacker to elevate privileges over a network. | 
    
    
    
        | Improper access control in Azure Event Grid allows an unauthorized attacker to elevate privileges over a network. | 
    
    
    
        | Copilot Spoofing Vulnerability | 
    
    
    
        | Improper neutralization of input during web page generation ('cross-site scripting') in Azure Monitor allows an unauthorized attacker to perform spoofing over a network. | 
    
    
    
        | Copilot Spoofing Vulnerability | 
    
    
    
        | Redis Enterprise Elevation of Privilege Vulnerability | 
    
    
    
        | M365 Copilot Spoofing Vulnerability | 
    
    
    
        | Azure PlayFab Elevation of Privilege Vulnerability | 
    
    
    
        | Azure Entra ID Elevation of Privilege Vulnerability | 
    
    
    
        | Azure Entra ID Elevation of Privilege Vulnerability |