Browse and filter security vulnerabilities across ecosystems
Browse and filter security vulnerabilities across ecosystems
Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
Microsoft SharePoint Server Remote Code Execution Vulnerability
Apache Airflow: Dags endpoint might provide access to otherwise inaccessible entities
Apache Airflow: Assets graph view bypasses DAG level access control displaying unrelated topologies and all DAGs names to unauthorized users
Argocd-image-updater: argocd image updater: cross-namespace privilege escalation via insufficient namespace validation
Microsoft Defender Elevation of Privilege Vulnerability
Insufficient granularity of access control for Remote Connector Servers in client mode
Cisco Application Policy Infrastructure Controller Denial of Service Vulnerability
Insufficient Granularity of Access Control in SEV firmware can allow a privileged attacker to create a SEV-ES Guest to attack SNP guest, potentiall...
Insufficient Granularity of Access Control in SEV firmware could allow a privileged user with a malicious hypervisor to create a SEV-ES guest with ...
Privilege Elevation in Ercom Cryptobox administration console
Insufficient Access Control in lunary-ai/lunary
Insufficient Granularity of Access Control in GitLab
Improper Access Control in Asseco Infomedica Plus
A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to obtain sensitive information fr...
Insufficient Access Control vulnerability has been discovered in OpenText Flipper.
Insufficient access control vulnerability has been discovered in Opentext Flipper.
ChatLuck contains an insufficient granularity of access control vulnerability in Invitation of Guest Users
Freeipa: idm: privilege escalation from host to domain admin in freeipa
Improper input validation in the system management mode (SMM) could allow a privileged attacker to overwrite arbitrary memory potentially resulting...
Showing 1 - 20 of 1,000+ results