CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 115178 CVEs

CVE ID Severity Description EPSS Published
N/A

An authentication bypass vulnerability exists in Vaadin 14.0.0 through 14.14.0, 23.0.0 through 23.6.6, 24.0.0 through 24.9.7 and 25.0.0 through 25.0.1, applications using Spring Security due to inconsistent path pattern matching of reserved framework paths. Accessing the /VAADIN endpoint without a trailing slash bypasses security filters, and allowing unauthenticated users to trigger framework initialization and create sessions without proper authorization. Users of affected versions using Spring Security should upgrade as follows: 14.0.0-14.14.0 upgrade to 14.14.1, 23.0.0-23.6.6 to 23.6.7, 24.0.0 - 24.9.7 to 24.9.8, and 25.0.0-25.0.1 upgrade to 25.0.2 or newer. Please note that Vaadin versions 10-13 and 15-22 are no longer supported and you should update either to the latest 14, 23, 24, 25 version.

0.4% 2026-03-10
N/A

Specially crafted ZIP archives can escape the intended extraction directory during Node.js download and extraction in Vaadin 14.2.0 through 14.14.0, 15.0.0 through 23.6.6, 24.0.0 through 24.9.8, and 25.0.0 through 25.0.2. Vaadin’s build process can automatically download and extract Node.js if it is not installed locally. If an attacker can intercept or control this download via DNS hijacking, a MITM attack, a compromised mirror, or a supply chain attack, they can serve a malicious archive containing path traversal sequences that write files outside the intended extraction directory. Users of affected versions should use a globally preinstalled Node.js version compatible with their Vaadin version, or upgrade as follows: 14.2.0-14.14.0 to 14.14.1, 15.0.0-23.6.6 to 23.6.7, 24.0.0-24.9.8 to 24.9.9, and 25.0.0-25.0.2 to 25.0.3 or newer. Please note that Vaadin versions 10-13 and 15-22 are no longer supported and you should update either to the latest 14, 23, 24, 25 version.

0.1% 2026-03-10
7.2 HIGH

The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entry fields in all versions up to, and including, 2.0.5. This is due to insufficient input sanitization and output escaping on form submission data displayed in the admin Form Entries Trash view. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator views the trashed form entries.

0.1% 2026-03-10
7.5 HIGH

Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before 3.5.1.

0.1% 2026-03-10
N/A

CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exist that could cause execution of untrusted commands on the engineering workstation which could result in a limited compromise of the workstation and a potential loss of Confidentiality, Integrity and Availability of the subsequent system when an authenticated user opens a malicious project file.

0.0% 2026-03-10
4.3 MEDIUM

A vulnerability has been identified in SINEC Security Monitor (All versions < V4.9.0). The affected application leaks confidential information in metadata, and files such as information on contributors and email address, on `SSM Server`.

0.0% 2026-03-10
7.8 HIGH

Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file.

0.1% 2026-03-10
8.1 HIGH

External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally.

0.1% 2026-03-10
7.5 HIGH

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.

0.1% 2026-03-10
7.8 HIGH

Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.

0.1% 2026-03-10
7.8 HIGH

Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.8 HIGH

Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.5 HIGH

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

3.5% 2026-03-10
7.8 HIGH

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.5 HIGH

Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.

0.1% 2026-03-10
7.5 HIGH

Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.

0.2% 2026-03-10
8.8 HIGH

Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.

0.0% 2026-03-10
7.8 HIGH

Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
8.8 HIGH

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.

0.1% 2026-03-10
8.8 HIGH

Improper validation of specified type of input in SQL Server allows an authorized attacker to elevate privileges over a network.

0.1% 2026-03-10
8.8 HIGH

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

0.9% 2026-03-10
8.4 HIGH

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.

0.0% 2026-03-10
7.8 HIGH

Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.0% 2026-03-10
8.0 HIGH

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

0.1% 2026-03-10
8.4 HIGH

Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.

0.1% 2026-03-10
8.4 HIGH

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.0% 2026-03-10
7.8 HIGH

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.0% 2026-03-10
7.8 HIGH

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2026-03-10
8.8 HIGH

Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

0.1% 2026-03-10
8.1 HIGH

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

0.0% 2026-03-10
4.3 MEDIUM

An improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4 may allow a remote unauthenticated attacker to provide arbitrary data enabling a social engineering attack via spoofed URL parameters.

0.1% 2026-03-10
7.2 HIGH

An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox Cloud 5.0.4 may allow a privileged attacker with super-admin profile and CLI access to execute unauthorized code or commands via crafted HTTP requests.

0.1% 2026-03-10
6.5 MEDIUM

An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.2.0, FortiDeceptor 6.0 all versions, FortiDeceptor 5.3 all versions, FortiDeceptor 5.2 all versions, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions, FortiDeceptor 4.3 all versions, FortiDeceptor 4.2 all versions, FortiDeceptor 4.1 all versions, FortiDeceptor 4.0 all versions may allow a privileged attacker with super-admin profile and CLI access to delete sensitive files via crafted HTTP requests.

0.1% 2026-03-10
6.7 MEDIUM

A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application performs file deletion without properly validating the file path or target. An attacker could delete files or sockets that the affected process has permission to remove, potentially resulting in denial of service or service disruption.

0.0% 2026-03-10
7.4 HIGH

A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application builds shell commands with caller-provided strings and executes them. An attacker could influence the executed command, potentially resulting in command injection and full system compromise.

0.0% 2026-03-10
5.1 MEDIUM

A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK server component does not enforce maximum length checks on certain variables before use. This could allow an attacker to send an oversized input that could trigger a stack overflow crashing the process and potentially causing denial of service.

0.0% 2026-03-10
5.1 MEDIUM

A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK client component does not enforce maximum length checks on certain variables before use. This could allow an attacker to send an oversized input that could trigger a stack overflow crashing the process and potentially causing denial of service.

0.0% 2026-03-10
7.4 HIGH

A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK does not perform checks on input values potentially resulting in stack overflow. This could allow an attacker to perform code execution and denial of service.

0.0% 2026-03-10
7.4 HIGH

A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). An out-of-bounds write vulnerability exists in SICAM SIAPP SDK. This could allow an attacker to write data beyond the intended buffer, potentially leading to denial of service, or arbitrary code execution.

0.0% 2026-03-10
7.8 HIGH

Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.

0.0% 2026-03-10
7.8 HIGH

Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.

0.1% 2026-03-10
8.8 HIGH

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an adjacent network.

0.0% 2026-03-10
7.8 HIGH

Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate privileges locally.

0.1% 2026-03-10
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to disclose information locally.

0.0% 2026-03-10
5.3 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network.

0.1% 2026-03-10
7.5 HIGH

Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network.

0.1% 2026-03-10
5.5 MEDIUM

Out-of-bounds read in Microsoft Graphics Component allows an unauthorized attacker to disclose information locally.

0.0% 2026-03-10
7.0 HIGH

Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10
7.0 HIGH

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2026-03-10