Browse and filter security vulnerabilities across ecosystems
Browse and filter security vulnerabilities across ecosystems
hoppscotch: Unauthenticated Onboarding Config Disclosure via Empty Recovery Token
vm2: nesting: true bypasses require: false, allowing sandbox escape to arbitrary OS command execution
Flowsint: Broken Access Control allows modification of investigation metadata from any user
Flowsint: Broken Access Control allows reading of sketch logs from any user
GoJobs: Insecure Direct Object Reference (IDOR) in Job Retrieval Endpoint
Pulpy: Incomplete filesystem sandbox in pulpy.fs bridge allows packaged web apps to read arbitrary user files
linux-entra-sso: PRT SSO cookie can leak to attacker-controlled hosts when broad host permissions are granted
Microsoft Office Spoofing Vulnerability
Azure Logic Apps Elevation of Privilege Vulnerability
Azure Connected Machine Agent Elevation of Privilege Vulnerability
Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability
M365 Copilot for Desktop Spoofing Vulnerability
Microsoft PowerPoint for Android Spoofing Vulnerability
Microsoft Word for Android Spoofing Vulnerability
Microsoft 365 Copilot for Android Spoofing Vulnerability
Windows Event Logging Service Elevation of Privilege Vulnerability
A improper access control vulnerability in Fortinet FortiAuthenticator 8
Improper access control for some Intel Vision software for all versions within Ring 3: User Applications may allow a denial of service
Showing 1 - 20 of 1,000+ results