Filtered by vendor
Subscriptions
Total
1234 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-36903 | 1 Microsoft | 19 Windows 10, Windows 10 1507, Windows 10 1607 and 16 more | 2024-11-21 | 7.8 High |
Windows System Assessment Tool Elevation of Privilege Vulnerability | ||||
CVE-2023-36876 | 1 Microsoft | 2 Windows Server 2008, Windows Server 2008 R2 | 2024-11-21 | 7.1 High |
Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability | ||||
CVE-2023-36874 | 1 Microsoft | 19 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 16 more | 2024-11-21 | 7.8 High |
Windows Error Reporting Service Elevation of Privilege Vulnerability | ||||
CVE-2023-36758 | 1 Microsoft | 2 Visual Studio, Visual Studio 2022 | 2024-11-21 | 7.8 High |
Visual Studio Elevation of Privilege Vulnerability | ||||
CVE-2023-36705 | 1 Microsoft | 23 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 20 more | 2024-11-21 | 7.8 High |
Windows Installer Elevation of Privilege Vulnerability | ||||
CVE-2023-36399 | 1 Microsoft | 8 Windows 11 21h2, Windows 11 21h2, Windows 11 22h2 and 5 more | 2024-11-21 | 7.1 High |
Windows Storage Elevation of Privilege Vulnerability | ||||
CVE-2023-36394 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2024-11-21 | 7 High |
Windows Search Service Elevation of Privilege Vulnerability | ||||
CVE-2023-36391 | 1 Microsoft | 2 Windows 11 23h2, Windows 11 23h2 | 2024-11-21 | 7.8 High |
Local Security Authority Subsystem Service Elevation of Privilege Vulnerability | ||||
CVE-2023-36047 | 1 Microsoft | 14 Windows 10 1809, Windows 10 21h2, Windows 10 21h2 and 11 more | 2024-11-21 | 7.8 High |
Windows Authentication Elevation of Privilege Vulnerability | ||||
CVE-2023-36046 | 1 Microsoft | 8 Windows 11 21h2, Windows 11 21h2, Windows 11 22h2 and 5 more | 2024-11-21 | 7.1 High |
Windows Authentication Denial of Service Vulnerability | ||||
CVE-2023-35633 | 1 Microsoft | 6 Windows 10 1507, Windows Server 2008, Windows Server 2008 R2 and 3 more | 2024-11-21 | 7.8 High |
Windows Kernel Elevation of Privilege Vulnerability | ||||
CVE-2023-35624 | 1 Microsoft | 1 Azure Connected Machine Agent | 2024-11-21 | 7.3 High |
Azure Connected Machine Agent Elevation of Privilege Vulnerability | ||||
CVE-2023-35379 | 1 Microsoft | 2 Windows Server 2008, Windows Server 2008 R2 | 2024-11-21 | 7.8 High |
Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability | ||||
CVE-2023-35353 | 1 Microsoft | 13 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 10 more | 2024-11-21 | 7.8 High |
Connected User Experiences and Telemetry Elevation of Privilege Vulnerability | ||||
CVE-2023-35347 | 1 Microsoft | 9 Windows 10 21h2, Windows 10 21h2, Windows 10 22h2 and 6 more | 2024-11-21 | 7.1 High |
Microsoft Install Service Elevation of Privilege Vulnerability | ||||
CVE-2023-35342 | 1 Microsoft | 18 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 15 more | 2024-11-21 | 7.8 High |
Windows Image Acquisition Elevation of Privilege Vulnerability | ||||
CVE-2023-35320 | 1 Microsoft | 13 Windows 10 1607, Windows 10 1809, Windows 10 21h2 and 10 more | 2024-11-21 | 7.8 High |
Connected User Experiences and Telemetry Elevation of Privilege Vulnerability | ||||
CVE-2023-34723 | 2 Jaycar, Techview | 3 La5570, La5570 Firmware, La-5570 Wireless Gateway | 2024-11-21 | 7.5 High |
An issue was discovered in TechView LA-5570 Wireless Gateway 1.0.19_T53, allows attackers to gain sensitive information via /config/system.conf. | ||||
CVE-2023-34283 | 2024-11-21 | N/A | ||
NETGEAR RAX30 USB Share Link Following Information Disclosure Vulnerability. This vulnerability allows physically present attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of symbolic links on removable USB media. By creating a symbolic link, an attacker can abuse the router's web server to access arbitrary local files. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-19498. | ||||
CVE-2023-34204 | 1 Imapsync Project | 1 Imapsync | 2024-11-21 | 6.5 Medium |
imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it. |