Microsoft Windows Kernel code execution | CVE-2023-28237
NAME__________Microsoft Windows Kernel code executionPlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10 x32 Microsoft Windows...
NAME__________Microsoft Windows Kernel code executionPlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10 x32 Microsoft Windows...
NAME__________Microsoft Windows Secure Socket Tunneling Protocol (SSTP) denial of servicePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft...
NAME__________Microsoft Windows Clip Service privilege escalationPlatforms Affected:Microsoft Windows Server 2016 Microsoft Windows Server 2019 Microsoft Windows 10 1809 for x64-based...
NAME__________Microsoft Windows Network File System information disclosurePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2016...
NAME__________SAP NetWeaver Enterprise Portal security bypassPlatforms Affected:SAP NetWeaver Enterprise Portal 7.50Risk Level:6.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________SAP NetWeaver Enterprise Portal could allow a...
NAME__________SAP SapSetup privilege escalationPlatforms Affected:SAP SapSetup 9.0Risk Level:6.7Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________SAP SapSetup could allow a local authenticated attacker to gain elevated...
NAME__________Microsoft Publisher code executionPlatforms Affected:Microsoft Publisher 2016 x64Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft Publisher could allow a remote attacker to execute arbitrary...
NAME__________Microsoft Publisher code executionPlatforms Affected:Microsoft Publisher 2016 x32 Microsoft Publisher 2016 x64Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft Publisher could allow a remote...
NAME__________Adobe Substance 3D Stager information disclosurePlatforms Affected:Adobe Substance 3D Stager 2.0.1Risk Level:5.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Adobe Substance 3D Stager could allow a...
NAME__________SAP Landscape Management information disclosurePlatforms Affected:SAP Landscape Management 3.0Risk Level:6.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________SAP Landscape Management could allow a remote attacker to...
NAME__________Microsoft Azure Machine Learning information disclosurePlatforms Affected:Microsoft Azure Machine LearningRisk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Microsoft Azure Machine Learning could allow a remote...
NAME__________Mozilla Firefox for Android and Focus for Android spoofingPlatforms Affected:Mozilla Firefox for Android 111 Mozilla Focus for Android 111Risk Level:6.5Exploitability:UnprovenConsequences:Gain...
NAME__________Microsoft Visual Studio spoofingPlatforms Affected:Microsoft Visual Studio 2022 17.4Risk Level:5.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft Visual Studio could allow a local authenticated attacker...
NAME__________Microsoft Windows Remote Procedure Call Runtime information disclosurePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10...
NAME__________Siemens products denial of servicePlatforms Affected:Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Siemens products are vulnerable to a denial of service, caused by...
NAME__________SAP NetWeaver AS Java for Deploy Service information disclosurePlatforms Affected:SAP NetWeaver AS Java for Deploy Service 7.50Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________SAP...
NAME__________Fortinet FortiClientWindows directory traversalPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Fortinet FortiClientWindows could allow a local authenticated attacker to traverse directories on the...
NAME__________Fortinet FortiOS and FortiProxy brute forcePlatforms Affected:Risk Level:6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Fortinet FortiOS and FortiProxy is vulnerable to a brute force attack,...
NAME__________Fortinet FortiOS and FortiProxy open redirectPlatforms Affected:Risk Level:4.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Fortinet FortiOS and FortiProxy could allow a remote authenticated attacker to...
NAME__________Fortinet FortiWeb and FortiADC command executionPlatforms Affected:Risk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Fortinet FortiWeb and FortiADC could allow a local authenticated attacker to...
NAME__________Fortinet FortiAnalyzer information disclosurePlatforms Affected:Risk Level:7.1Exploitability:Consequences:Obtain Information DESCRIPTION__________Fortinet FortiAnalyzer could allow a local authenticated attacker to obtain sensitive information, caused...
NAME__________Fortinet FortiClientWindows privilege escalationPlatforms Affected:Risk Level:7.5Exploitability:UnprovenConsequences:Gain Privilege DESCRIPTION__________Fortinet FortiClientWindows could allow a remote attacker to gain elevated privileges on the...
NAME__________Adobe Acrobat and Adobe Reader code executionPlatforms Affected:Adobe Acrobat DC 23.001.20093 Adobe Acrobat Reader DC 23.001.20093 Adobe Acrobat 2020 20.005.30441...
NAME__________Siemens products denial of servicePlatforms Affected:Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Siemens products are vulnerable to a denial of service, caused by...