CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
A vulnerability has been found in Seismic App 2.4.2 on Android. Affected is an unknown function of the file AndroidManifest.xml of the component com.seismic.doccenter. Such manipulation leads to improper export of android application components. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally. |
Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally. |
The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network. |
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
Improper access control in Azure Virtual Machines allows an authorized attacker to perform spoofing locally. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Storage allows an unauthorized attacker to execute code over a network. |
Improper verification of cryptographic signature in Windows Certificates allows an unauthorized attacker to perform spoofing over a network. |
User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network. |
Microsoft 365 Copilot BizChat Information Disclosure Vulnerability |
Microsoft 365 Copilot BizChat Information Disclosure Vulnerability |
Azure OpenAI Elevation of Privilege Vulnerability |
Azure Portal Elevation of Privilege Vulnerability |
Improper authentication in Azure Stack allows an unauthorized attacker to disclose information over a network. |
Missing authentication for critical function in Windows StateRepository API allows an authorized attacker to elevate privileges locally. |
Time-of-check time-of-use (toctou) race condition in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally. |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network. |
Relative path traversal in Windows Kerberos allows an authorized attacker to elevate privileges over a network. |
Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network. |