CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 31877 CVEs

CVE ID Severity Description EPSS Published
7.3 HIGH

A path traversal vulnerability in FastX3 thru 3.3.67 allows an unauthenticated attacker to read arbitrary files on the server. By leveraging this vulnerability, it is possible to access the application's configuration files, which contain the secret key used to sign JSON Web Tokens as well as existing JTIs. With this information, an attacker can forge valid JWTs, impersonate the root user, and achieve remote code execution in privileged context via authenticated endpoints.

0.5% 2025-10-14
6.5 MEDIUM

A path traversal in StarNet Communications Corporation FastX v.4 through v4.1.51 allows unauthenticated attackers to read arbitrary files.

0.1% 2025-10-14
8.4 HIGH

NVIDIA Isaac Lab contains a vulnerability in SB3 configuration parsing. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.

0.0% 2025-10-14
7.3 HIGH

A flaw has been found in itsourcecode Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /index.php. This manipulation of the argument Username causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.

0.0% 2025-10-14
6.8 MEDIUM

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Commands Connectors configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.

0.0% 2025-10-14
7.3 HIGH

A Cross-Site Request Forgery (CSRF) in the component /endpoints/currency/currency of Wallos v4.1.1 allows attackers to execute arbitrary operations via a crafted GET request.

0.0% 2025-10-14
7.5 HIGH

Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.

9.4% 2025-10-14
7.0 HIGH

Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally.

0.0% 2025-10-14
7.8 HIGH

Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
8.8 HIGH

Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network.

0.3% 2025-10-14
2.1 LOW

Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack.

0.1% 2025-10-14
8.2 HIGH

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
8.2 HIGH

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
7.8 HIGH

Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
7.0 HIGH

Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
5.3 MEDIUM

Improper verification of cryptographic signature in Github: Playwright allows an unauthorized attacker to perform spoofing over an adjacent network.

0.0% 2025-10-14
9.8 CRITICAL

Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.

78.0% 2025-10-14
7.0 HIGH

Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.

1.0% 2025-10-14
3.3 LOW

Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

0.1% 2025-10-14
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally.

0.1% 2025-10-14
7.8 HIGH

Improper link resolution before file access ('link following') in XBox Gaming Services allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
3.1 LOW

Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network.

0.1% 2025-10-14
7.8 HIGH

Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
7.8 HIGH

Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
7.8 HIGH

Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
7.0 HIGH

Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.

0.0% 2025-10-14
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Microsoft Failover Cluster Virtual Driver allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
6.5 MEDIUM

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

0.2% 2025-10-14
6.2 MEDIUM

Insertion of sensitive information into log file in Active Directory Federation Services allows an unauthorized attacker to disclose information locally.

0.1% 2025-10-14
6.5 MEDIUM

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

0.2% 2025-10-14
7.8 HIGH

Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
7.8 HIGH

Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
5.5 MEDIUM

Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally.

0.1% 2025-10-14
8.1 HIGH

Improper input validation in JDBC Driver for SQL Server allows an unauthorized attacker to perform spoofing over a network.

0.1% 2025-10-14
8.8 HIGH

Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network.

0.1% 2025-10-14
7.5 HIGH

Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

0.2% 2025-10-14
6.5 MEDIUM

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.

0.1% 2025-10-14
7.8 HIGH

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-10-14
7.8 HIGH

Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
7.8 HIGH

Improper link resolution before file access ('link following') in Windows Health and Optimized Experiences Service allows an authorized attacker to elevate privileges locally.

0.1% 2025-10-14
7.8 HIGH

Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.

0.1% 2025-10-14
8.8 HIGH

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

3.0% 2025-10-14
8.4 HIGH

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-10-14
7.1 HIGH

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

0.1% 2025-10-14
7.8 HIGH

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

0.1% 2025-10-14
7.8 HIGH

Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-10-14
7.1 HIGH

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

0.1% 2025-10-14
7.8 HIGH

Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

0.1% 2025-10-14
7.8 HIGH

Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.

9.5% 2025-10-14
5.5 MEDIUM

Uncaught exception in Microsoft Office allows an unauthorized attacker to deny service locally.

0.1% 2025-10-14