Search Results (378 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-30389 1 Microsoft 1 Azure Ai Bot Service 2025-06-04 8.7 High
Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.
CVE-2024-21638 1 Microsoft 1 Azure Ipam 2025-06-03 9.1 Critical
Azure IPAM (IP Address Management) is a lightweight solution developed on top of the Azure platform designed to help Azure customers manage their IP Address space easily and effectively. By design there is no write access to customers' Azure environments as the Service Principal used is only assigned the Reader role at the root Management Group level. Until recently, the solution lacked the validation of the passed in authentication token which may result in attacker impersonating any privileged user to access data stored within the IPAM instance and subsequently from Azure, causing an elevation of privilege. This vulnerability has been patched in version 3.0.0.
CVE-2022-35772 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 7.2 High
Azure Site Recovery Remote Code Execution Vulnerability
CVE-2022-35782 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 6.5 Medium
Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2022-35781 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 6.5 Medium
Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2022-35780 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 6.5 Medium
Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2022-35779 1 Microsoft 1 Azure Real Time Operating System Guix Studio 2025-05-29 7.8 High
Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2022-35776 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 6.2 Medium
Azure Site Recovery Denial of Service Vulnerability
CVE-2022-35775 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 6.5 Medium
Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2022-35774 1 Microsoft 1 Azure Site Recovery Vmware To Azure 2025-05-29 4.9 Medium
Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2022-35773 1 Microsoft 1 Azure Real Time Operating System Guix Studio 2025-05-29 7.8 High
Azure RTOS GUIX Studio Remote Code Execution Vulnerability
CVE-2019-0996 1 Microsoft 1 Azure Devops Server 2025-05-20 N/A
A spoofing vulnerability exists in Azure DevOps Server when it improperly handles requests to authorize applications, resulting in a cross-site request forgery. An attacker who successfully exploited this vulnerability could bypass OAuth protections and register an application on behalf of the targeted user. To exploit this vulnerability, an attacker would need to create a page specifically designed to cause a cross-site request. The attacker would then need to convince a targeted user to click a link to the malicious page. The update addresses the vulnerability by modifying how Azure DevOps Server protects application registration requests.
CVE-2024-21403 1 Microsoft 1 Azure Kubernetes Service 2025-05-09 9 Critical
Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CVE-2024-20667 1 Microsoft 1 Azure Devops Server 2025-05-09 7.5 High
Azure DevOps Server Remote Code Execution Vulnerability
CVE-2024-21376 1 Microsoft 1 Azure Kubernetes Service 2025-05-08 9 Critical
Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability
CVE-2024-20676 1 Microsoft 1 Azure Storage Mover 2025-05-03 8 High
Azure Storage Mover Remote Code Execution Vulnerability
CVE-2024-21397 1 Microsoft 1 Azure File Sync 2025-05-03 5.3 Medium
Microsoft Azure File Sync Elevation of Privilege Vulnerability
CVE-2024-21364 1 Microsoft 1 Azure Site Recovery 2025-05-03 9.3 Critical
Microsoft Azure Site Recovery Elevation of Privilege Vulnerability
CVE-2024-20679 1 Microsoft 1 Azure Stack Hub 2025-05-03 6.5 Medium
Azure Stack Hub Spoofing Vulnerability
CVE-2024-21381 1 Microsoft 1 Azure Active Directory 2025-05-03 6.8 Medium
Microsoft Azure Active Directory B2C Spoofing Vulnerability