CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 20512 CVEs

CVE ID Severity Description EPSS Published
6.5 MEDIUM

Improper input validation in the component /kafka/ui/serdes/CustomSerdeLoader.java of kafka-ui v0.6.0 to v0.7.2 allows attackers to execute arbitrary code via supplying crafted data.

0.1% 2025-10-14
6.5 MEDIUM

A path traversal in StarNet Communications Corporation FastX v.4 through v4.1.51 allows unauthenticated attackers to read arbitrary files.

0.1% 2025-10-14
6.8 MEDIUM

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Centreon Infra Monitoring (Commands Connectors configuration modules) allows Stored XSS by users with elevated privileges. This issue affects Infra Monitoring: from 24.10.0 before 24.10.13, from 24.04.0 before 24.04.18, from 23.10.0 before 23.10.28.

0.0% 2025-10-14
5.3 MEDIUM

Improper verification of cryptographic signature in Github: Playwright allows an unauthorized attacker to perform spoofing over an adjacent network.

0.0% 2025-10-14
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Microsoft Failover Cluster Virtual Driver allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
6.5 MEDIUM

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

0.2% 2025-10-14
6.2 MEDIUM

Insertion of sensitive information into log file in Active Directory Federation Services allows an unauthorized attacker to disclose information locally.

0.1% 2025-10-14
6.5 MEDIUM

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

0.2% 2025-10-14
5.5 MEDIUM

Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally.

0.0% 2025-10-14
6.5 MEDIUM

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.

0.1% 2025-10-14
5.5 MEDIUM

Uncaught exception in Microsoft Office allows an unauthorized attacker to deny service locally.

0.0% 2025-10-14
6.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.

0.1% 2025-10-14
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
5.5 MEDIUM

Use of uninitialized resource in Windows Management Services allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
5.5 MEDIUM

Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
5.0 MEDIUM

Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally.

0.1% 2025-10-14
5.5 MEDIUM

Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
5.5 MEDIUM

Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally.

0.1% 2025-10-14
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Failover Cluster allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
6.5 MEDIUM

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.

0.1% 2025-10-14
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
6.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.

0.1% 2025-10-14
6.5 MEDIUM

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

0.2% 2025-10-14
4.7 MEDIUM

Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.

0.0% 2025-10-14
6.5 MEDIUM

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

0.0% 2025-10-14
6.5 MEDIUM

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

0.0% 2025-10-14
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
5.5 MEDIUM

Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally.

0.0% 2025-10-14
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
6.1 MEDIUM

Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

0.0% 2025-10-14
5.1 MEDIUM

Improper input validation in Windows Kernel allows an unauthorized attacker to disclose information locally.

0.1% 2025-10-14
5.5 MEDIUM

Generation of error message containing sensitive information in Windows USB Video Driver allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
6.1 MEDIUM

Missing Ability to Patch ROM Code in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

0.3% 2025-10-14
6.1 MEDIUM

Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

0.0% 2025-10-14
5.5 MEDIUM

Exposure of sensitive information to an unauthorized actor in Windows Cloud Files Mini Filter Driver allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
6.2 MEDIUM

Cleartext storage of sensitive information in Windows Kernel allows an unauthorized attacker to bypass a security feature locally.

0.0% 2025-10-14
6.1 MEDIUM

Incomplete comparison with missing factors in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

0.1% 2025-10-14
6.1 MEDIUM

Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

0.0% 2025-10-14
6.1 MEDIUM

Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

0.0% 2025-10-14
5.5 MEDIUM

Buffer over-read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
6.8 MEDIUM

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to elevate privileges over an adjacent network.

0.1% 2025-10-14
4.8 MEDIUM

Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.

0.0% 2025-10-14
6.5 MEDIUM

An incorrect OIDC authentication flow in Claroty Secure Access 3.3.0 through 4.0.2 can result in unauthorized user creation or impersonation of existing OIDC users.

0.1% 2025-10-14
6.3 MEDIUM

Use of a key past its expiration date in Virtual Secure Mode allows an authorized attacker to perform spoofing locally.

0.0% 2025-10-14
5.5 MEDIUM

Insertion of sensitive information into log file in Windows Failover Cluster allows an authorized attacker to disclose information locally.

0.1% 2025-10-14
6.5 MEDIUM

A vulnerability in the parsing of ethernet frames in AOS-8 Instant and AOS 10 could allow an unauthenticated remote attacker to conduct a denial of service attack. Successful exploitation could allow an attacker to potentially disrupt network services and require manual intervention to restore functionality.

0.1% 2025-10-14
4.9 MEDIUM

Arbitrary file download vulnerabilities exist in a low-level interface library in AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits.

0.1% 2025-10-14
4.9 MEDIUM

Arbitrary file download vulnerabilities exist in a low-level interface library in AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to download arbitrary files through carefully constructed exploits.

0.1% 2025-10-14