CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP.
This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438. |
Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network |
Improper limitation of a pathname to a restricted directory ('path traversal') in Azure allows an unauthorized attacker to elevate privileges over a network. |
An improper access control vulnerability in the Azure Managed Instance for Apache Cassandra allows an authenticated attacker to elevate privileges over a network. |
An authenticated attacker can exploit an Server-Side Request Forgery (SSRF) vulnerability in Microsoft Azure Health Bot to elevate privileges over a network. |
Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability |
Windows TCP/IP Remote Code Execution Vulnerability |
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability |
Windows Network Virtualization Remote Code Execution Vulnerability |
Windows Network Virtualization Remote Code Execution Vulnerability |
Azure Stack Hub Spoofing Vulnerability |
Jpress until v5.1.1 has arbitrary file uploads on the windows platform, and the construction of non-standard file formats such as .jsp. can lead to arbitrary command execution |
Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network. |
Improper authorization in Azure allows an authorized attacker to elevate privileges over a network. |
In affected versions of Octopus Deploy it is possible to bypass rate limiting on login using null bytes. |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
A remote code execution vulnerability exists in the Windows agent component of SecureConnector due to improper access controls on a named pipe. The pipe is accessible to the Everyone group and does not restrict remote connections, allowing any network-based attacker to connect without authentication. By interacting with this pipe, an attacker can redirect the agent to communicate with a rogue server that can issue commands via the SecureConnector Agent.
This does not impact Linux or OSX Secure Connector. |
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
Deserialization of untrusted data in Microsoft Update Catalog allows an unauthorized attacker to elevate privileges on the website’s webserver. |
Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability |