5.9CVSS
6.2AI Score
0.0004EPSS
6.3CVSS
6.8AI Score
0.0005EPSS
7.3CVSS
9AI Score
0.0004EPSS
7.5CVSS
7.6AI Score
0.0005EPSS
7.5CVSS
7.7AI Score
0.0005EPSS
7.5CVSS
7.7AI Score
0.003EPSS
7.5CVSS
7.7AI Score
0.001EPSS
6.8CVSS
6.6AI Score
0.001EPSS
7.5CVSS
7.3AI Score
0.002EPSS
9.8CVSS
9.3AI Score
0.001EPSS
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass...
8.7CVSS
9.1AI Score
0.001EPSS
6.2CVSS
5.5AI Score
0.0005EPSS
9.8CVSS
9.3AI Score
0.001EPSS
7.5CVSS
7.3AI Score
0.002EPSS
7.5CVSS
7.3AI Score
0.001EPSS
6.5CVSS
6.6AI Score
0.001EPSS
7.8CVSS
8.2AI Score
0.001EPSS
7.8CVSS
8.2AI Score
0.001EPSS
7.8CVSS
8.2AI Score
0.001EPSS
7.8CVSS
7.8AI Score
0.001EPSS
7.5CVSS
7.2AI Score
0.002EPSS
7.8CVSS
7.8AI Score
0.008EPSS
8.1CVSS
7.8AI Score
0.001EPSS
8.1CVSS
8.2AI Score
0.001EPSS
7.5CVSS
7.5AI Score
0.002EPSS
7.8CVSS
8.7AI Score
0.002EPSS
7.8CVSS
8.2AI Score
0.001EPSS
7.5CVSS
7.4AI Score
0.001EPSS
7.3CVSS
7.5AI Score
0.002EPSS
6.5CVSS
6.8AI Score
0.001EPSS
7.3CVSS
7.4AI Score
0.001EPSS
7.3CVSS
7.7AI Score
0.001EPSS
7.8CVSS
7.7AI Score
0.002EPSS
7.8CVSS
7.8AI Score
0.001EPSS
7.8CVSS
8.2AI Score
0.002EPSS
5.9CVSS
5.7AI Score
0.001EPSS
7.5CVSS
7.3AI Score
0.002EPSS
7.8CVSS
7.7AI Score
0.0004EPSS
6.3CVSS
7AI Score
0.006EPSS
SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of...
5CVSS
5.7AI Score
0.001EPSS
7.5CVSS
7.2AI Score
0.002EPSS
8.1CVSS
8.3AI Score
0.081EPSS
6.5CVSS
6.8AI Score
0.002EPSS
A vulnerability of uPrism.io CURIX(Video conferecing solution) could allow an unauthenticated attacker to execute arbitrary code. This vulnerability is due to insufficient input(server domain) validation. An attacker could exploit this vulnerability through crafted...
8.8CVSS
8.9AI Score
0.003EPSS
5.4CVSS
5.2AI Score
0.001EPSS
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC. To exploit the...
6.7CVSS
7.6AI Score
0.0004EPSS
A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service...
7.5CVSS
7.3AI Score
0.001EPSS
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Quantum Ethernet Network module 140NOE771x1 (Versions 7.0 and prior), Quantum processors with integrated Ethernet – 140CPU65xxxxx (all Versions), and Premium processors with integrated Ethernet (all Versions),.....
7.5CVSS
7.6AI Score
0.001EPSS