Microsoft Windows AllJoyn API denial of service | CVE-2024-20687
NAME__________Microsoft Windows AllJoyn API denial of servicePlatforms Affected:Microsoft Windows 10 x32 Microsoft Windows 10 x64 Microsoft Windows Server 2016 Microsoft...
NAME__________Microsoft Windows AllJoyn API denial of servicePlatforms Affected:Microsoft Windows 10 x32 Microsoft Windows 10 x64 Microsoft Windows Server 2016 Microsoft...
NAME__________Microsoft Windows Message Queuing Client (MSMQC) information disclosurePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10...
NAME__________Siemens Solid Edge SE2023 code executionPlatforms Affected:Siemens Solid Edge SE2023Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens Solid Edge SE2023 could allow a remote...
NAME__________Microsoft Windows Common Log File System privilege escalationPlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10...
NAME__________Adobe Substance 3D Stager code executionPlatforms Affected:Adobe Substance 3D Stager 2.1.3Risk Level:5.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Adobe Substance 3D Stager could allow a...
NAME__________Siemens Teamcenter Visualization and JT2Go code executionPlatforms Affected:Siemens JT2Go 14.3.0.5Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens Teamcenter Visualization and JT2Go could allow a...
NAME__________Microsoft Windows Themes spoofingPlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10 x32 Microsoft Windows 10...
NAME__________Microsoft Windows Cryptographic Services code executionPlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2016 Microsoft...
NAME__________Siemens Solid Edge SE2023 buffer overflowPlatforms Affected:Siemens Solid Edge SE2023Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens Solid Edge SE2023 is vulnerable to a...
NAME__________Microsoft Windows Message Queuing Client (MSMQC) information disclosurePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10...
NAME__________Microsoft Printer Metadata Troubleshooter Tool code executionPlatforms Affected:Microsoft Printer Metadata Troubleshooter ToolRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft Printer Metadata Troubleshooter Tool could...
NAME__________Microsoft Windows Subsystem for Linux privilege escalationPlatforms Affected:Microsoft Windows Server 2022 Microsoft Windows Server (Server Core installation) 2022 Microsoft Windows...
NAME__________Microsoft Windows HTML Platforms security bypassPlatforms Affected:Microsoft Windows 10 x32 Microsoft Windows 10 x64 Microsoft Windows Server 2016 Microsoft Windows...
NAME__________Microsoft Windows Cloud Files Mini Filter Driver privilege escalationPlatforms Affected:Microsoft Windows Server 2019 Microsoft Windows 10 1809 for x64-based Systems...
NAME__________Siemens Solid Edge SE2023 code executionPlatforms Affected:Siemens Solid Edge SE2023Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens Solid Edge SE2023 could allow a remote...
NAME__________Microsoft Windows Hyper-V denial of servicePlatforms Affected:Microsoft Windows Server 2019 Microsoft Windows 10 1809 for x64-based Systems Microsoft Windows Server...
NAME__________Splunk Enterprise denial of servicePlatforms Affected:Splunk Splunk Enterprise Security 7.1.1Risk Level:4.3Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Splunk Enterprise is vulnerable to a denial...
NAME__________Siemens Solid Edge SE2023 buffer overflowPlatforms Affected:Siemens Solid Edge SE2023Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens Solid Edge SE2023 is vulnerable to a...
NAME__________Siemens Solid Edge SE2023 code executionPlatforms Affected:Siemens Solid Edge SE2023Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens Solid Edge SE2023 could allow a remote...
NAME__________Siemens Solid Edge SE2023 code executionPlatforms Affected:Siemens Solid Edge SE2023Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens Solid Edge SE2023 could allow a remote...
NAME__________Microsoft Windows Nearby Sharing spoofingPlatforms Affected:Microsoft Windows 10 1809 for x64-based Systems Microsoft Windows 10 1809 for 32-bit Systems Microsoft...
NAME__________Microsoft .NET Framework denial of servicePlatforms Affected:Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 for 32-bit Systems 1809 Microsoft...
NAME__________Siemens Solid Edge SE2023 buffer overflowPlatforms Affected:Siemens Solid Edge SE2023Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens Solid Edge SE2023 is vulnerable to a...
NAME__________Siemens Teamcenter Visualization and JT2Go code executionPlatforms Affected:Siemens JT2Go 14.3.0.5Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens Teamcenter Visualization and JT2Go could allow a...