Export limit exceeded: 352051 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 35340 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (35340 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-28221 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2025-01-23 7 High
Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2023-28218 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 7 High
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2023-28217 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 7.5 High
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2023-28216 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 7 High
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVE-2023-24931 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 7.5 High
Windows Secure Channel Denial of Service Vulnerability
CVE-2023-24912 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 7.8 High
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2023-23375 1 Microsoft 2 Odbc, Ole Db 2025-01-23 7.8 High
Microsoft ODBC and OLE DB Remote Code Execution Vulnerability
CVE-2023-21727 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 9 more 2025-01-23 8.8 High
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2023-21729 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 9 more 2025-01-23 4.3 Medium
Remote Procedure Call Runtime Information Disclosure Vulnerability
CVE-2023-23384 1 Microsoft 1 Sql Server 2025-01-23 7.3 High
Microsoft SQL Server Remote Code Execution Vulnerability
CVE-2023-24914 1 Microsoft 1 Windows 11 22h2 2025-01-23 7 High
Win32k Elevation of Privilege Vulnerability
CVE-2024-29976 1 Zyxel 4 Nas326, Nas326 Firmware, Nas542 and 1 more 2025-01-22 6.5 Medium
** UNSUPPORTED WHEN ASSIGNED ** The improper privilege management vulnerability in the command “show_allsessions” in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an authenticated attacker to obtain a logged-in administrator’s session information containing cookies on an affected device.
CVE-2024-29975 1 Zyxel 4 Nas326, Nas326 Firmware, Nas542 and 1 more 2025-01-22 6.7 Medium
** UNSUPPORTED WHEN ASSIGNED ** The improper privilege management vulnerability in the SUID executable binary in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an authenticated local attacker with administrator privileges to execute some system commands as the “root” user on a vulnerable device.
CVE-2024-1575 1 Zyxel 40 Nwa110ax, Nwa110ax Firmware, Nwa1123acv3 and 37 more 2025-01-22 6.5 Medium
The improper privilege management vulnerability in the Zyxel WBE660S firmware version 6.70(ACGG.3) and earlier versions could allow an authenticated user to escalate privileges and download the configuration files on a vulnerable device.
CVE-2023-32313 2 Redhat, Vm2 Project 3 Acm, Multicluster Engine, Vm2 2025-01-22 5.3 Medium
vm2 is a sandbox that can run untrusted code with Node's built-in modules. In versions 3.9.17 and lower of vm2 it was possible to get a read-write reference to the node `inspect` method and edit options for `console.log`. As a result a threat actor can edit options for the `console.log` command. This vulnerability was patched in the release of version `3.9.18` of `vm2`. Users are advised to upgrade. Users unable to upgrade may make the `inspect` method readonly with `vm.readonly(inspect)` after creating a vm.
CVE-2023-32314 2 Redhat, Vm2 Project 3 Acm, Multicluster Engine, Vm2 2025-01-22 9.8 Critical
vm2 is a sandbox that can run untrusted code with Node's built-in modules. A sandbox escape vulnerability exists in vm2 for versions up to and including 3.9.17. It abuses an unexpected creation of a host object based on the specification of `Proxy`. As a result a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.18` of `vm2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-30504 1 Arubanetworks 1 Edgeconnect Enterprise 2025-01-22 7.2 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30505 1 Arubanetworks 1 Edgeconnect Enterprise 2025-01-22 7.2 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30501 1 Arubanetworks 1 Edgeconnect Enterprise 2025-01-22 7.2 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30502 1 Arubanetworks 1 Edgeconnect Enterprise 2025-01-22 7.2 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.