A vulnerability categorized as critical has been discovered in Microsoft Azure AI Foundry. This impacts an unknown function. Such manipulation leads to improper access controls.
This vulnerability is traded as CVE-2026-35435. The attack may be launched remotely. There is no exploit available.
This product is a managed service. It is not possible for users to maintain vulnerability countermeasures themselves.
A vulnerability, which was classified as critical, was found in Microsoft Partner Center. This vulnerability affects unknown code. Such manipulation leads to externally controlled reference.
This vulnerability is listed as CVE-2026-34327. The attack may be performed from remote. There is no available exploit.
This product is a managed service, indicating that users are not permitted to maintain vulnerability countermeasures themselves.
A vulnerability was found in Microsoft Azure Managed Instance for Apache Cassandra and classified as critical. Impacted is an unknown function. Executing a manipulation can lead to improper access controls.
This vulnerability is registered as CVE-2026-33109. It is possible to launch the attack remotely. No exploit is available.
This product is a managed service, which means users themselves cannot handle vulnerability countermeasures.
A vulnerability was found in Microsoft Azure Managed Instance for Apache Cassandra. It has been classified as critical. The affected element is an unknown function. The manipulation leads to improper authorization.
This vulnerability is documented as CVE-2026-33844. The attack can be initiated remotely. There is not any exploit available.
This product is a managed service, therefore users are not responsible for maintaining vulnerability countermeasures.
A vulnerability was found in Microsoft Azure Cloud Shell. It has been rated as critical. This affects an unknown function. This manipulation causes command injection.
This vulnerability appears as CVE-2026-35428. The attack may be initiated remotely. There is no available exploit.
This product is available as a managed service. Users are not able to maintain vulnerability countermeasures themselves.
A vulnerability was found in Apple macOS up to 10.14.0. It has been declared as critical. This issue affects some unknown processing of the component Ruby. Executing a manipulation can lead to memory corruption.
This vulnerability appears as CVE-2017-14064. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability identified as problematic has been detected in Microsoft Azure Machine Learning. Affected is an unknown function. Performing a manipulation results in cross site scripting.
This vulnerability is known as CVE-2026-32207. Remote exploitation of the attack is possible. No exploit is available.
This product is a managed service. This means that users cannot maintain vulnerability countermeasures themselves.
A vulnerability identified as problematic has been detected in Ruby up to 2.2.7/2.3.4/2.4.1. This affects an unknown part of the file ext/json/ext/generator/generator.c. The manipulation leads to memory corruption (Memory).
This vulnerability is documented as CVE-2017-14064. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability described as problematic has been identified in RubyGems up to 2.6.12. This affects an unknown function of the component Query Command Handler. Executing a manipulation can lead to improper input validation.
This vulnerability appears as CVE-2017-0900. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in RubyGems up to 2.6.12. This impacts an unknown function of the component Specification Name Validator. The manipulation leads to improper input validation (File).
This vulnerability is traded as CVE-2017-0901. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in RubyGems up to 2.6.12. Affected is an unknown function of the component GEM Install. The manipulation results in improper access controls (DNS).
This vulnerability is known as CVE-2017-0902. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Ruby up to 2.3.x and classified as critical. Affected by this issue is the function Net::SMTP of the component SMTP Handler. The manipulation results in crlf injection.
This vulnerability is identified as CVE-2015-9096. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability marked as problematic has been reported in RubyGems up to 2.6.12. The impacted element is an unknown function of the component gem Handler. Performing a manipulation as part of Escape Sequence results in code injection.
This vulnerability is reported as CVE-2017-0899. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic was found in Erlang Mongoose 1.2.1/1.2.2/1.3.0/1.3.1. Affected is an unknown function. Executing a manipulation can lead to improper access controls.
The identification of this vulnerability is CVE-2014-2829. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Rodrigo Polo Stream Video Player 1.4.0. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery.
This vulnerability is listed as CVE-2013-2706. The attack may be initiated remotely. There is no available exploit.