Microsoft Word code execution | CVE-2023-36762
NAME__________Microsoft Word code executionPlatforms Affected:Microsoft Word 2016 x32 Microsoft Word 2016 x64 Microsoft SharePoint Enterprise Server 2016 Microsoft Office 2019...
NAME__________Microsoft Word code executionPlatforms Affected:Microsoft Word 2016 x32 Microsoft Word 2016 x64 Microsoft SharePoint Enterprise Server 2016 Microsoft Office 2019...
NAME__________Microsoft Visual Studio Code code executionPlatforms Affected:Microsoft Visual Studio CodeRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft Visual Studio Code could allow a remote...
NAME__________Siemens QMS Automotive file uploadPlatforms Affected:Siemens QMS AutomotiveRisk Level:5.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens QMS Automotive could allow a remote authenticated attacker to...
NAME__________Microsoft Visual Studio code executionPlatforms Affected:Microsoft Visual Studio 2015 Update 3 Microsoft Visual Studio 2013 Update 5 Microsoft Visual Studio...
NAME__________Microsoft Visual Studio code executionPlatforms Affected:Microsoft Visual Studio 2015 Update 3 Microsoft Visual Studio 2013 Update 5 Microsoft Visual Studio...
NAME__________Microsoft .NET Framework code executionPlatforms Affected:Microsoft .NET Framework 4.7.2 Developer Pack Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10...
NAME__________Siemens QMS Automotive weak securityPlatforms Affected:Siemens QMS AutomotiveRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Siemens QMS Automotive could provide weaker than expected security, caused...
NAME__________Adobe Acrobat and Adobe Reader code executionPlatforms Affected:Adobe Acrobat DC 23.003.20284 Adobe Acrobat Reader DC 23.003.20284 Adobe Acrobat 2020 20.005.30516...
NAME__________Microsoft 3D Viewer code executionPlatforms Affected:Microsoft 3D ViewerRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft 3D Viewer could allow a remote attacker to execute...
NAME__________Microsoft Visual Studio code executionPlatforms Affected:Microsoft Visual Studio 2015 Update 3 Microsoft Visual Studio 2013 Update 5 Microsoft Visual Studio...
NAME__________Microsoft Visual Studio code executionPlatforms Affected:Microsoft Visual Studio 2015 Update 3 Microsoft Visual Studio 2013 Update 5 Microsoft Visual Studio...
NAME__________Microsoft 3D Builder code executionPlatforms Affected:Microsoft 3D BuilderRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft 3D Builder could allow a remote attacker to execute...
NAME__________Microsoft Windows Scripting Engine code executionPlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2016 Microsoft...
NAME__________Microsoft Office spoofingPlatforms Affected:Microsoft Office 2013 SP1 x32 Microsoft Office 2013 SP1 x64 Microsoft Office 2013 SP1 RT Microsoft Office...
NAME__________Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers buffer overflowPlatforms Affected:Cisco RV110W Wireless-N VPN Firewall Cisco RV130W Wireless-N Multifunction...
NAME__________Imou Life com.mm.android.smartlifeiot app code executionPlatforms Affected:Imou Life com.mm.android.smartlifeiot for Android 6.8.0Risk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Imou Life com.mm.android.smartlifeiot app could allow...
NAME__________icms cross-site request forgeryPlatforms Affected:iCMS iCMS 7.0.16Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________icms is vulnerable to cross-site request forgery, caused by improper validation...
NAME__________Wave AI wave.ai.browser application code executionPlatforms Affected:Wave AI wave.ai.browser 1.0.35Risk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Wave AI wave.ai.browser application could allow a remote...
NAME__________Kofax Power PDF code executionPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF could allow a remote attacker to execute...
NAME__________WireMock server-side request forgeryPlatforms Affected:WireMock WireMock 2.35.0 WireMock WireMock 3.0.2Risk Level:4.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________WireMock is vulnerable to server-side request forgery, caused...
NAME__________PDF-XChange Editor code executionPlatforms Affected:Tracker Software PDF-XChange EditorRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________PDF-XChange Editor could allow a remote attacker to execute arbitrary...
NAME__________Kofax Power PDF code executionPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF could allow a remote attacker to execute...
NAME__________Visualware MyConnection Server code executionPlatforms Affected:Visualware MyConnection ServerRisk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Visualware MyConnection Server could allow a remote authenticated attacker to...
NAME__________Kofax Power PDF code executionPlatforms Affected:Kofax Power PDFRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Kofax Power PDF could allow a remote attacker to execute...