Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-35642 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2023-12-15 N/A 6.5 MEDIUM
Internet Connection Sharing (ICS) Denial of Service Vulnerability
CVE-2023-35643 1 Microsoft 4 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 1 more 2023-12-15 N/A 7.5 HIGH
DHCP Server Service Information Disclosure Vulnerability
CVE-2023-35639 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2023-12-15 N/A 8.8 HIGH
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVE-2023-35641 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2023-12-15 N/A 8.8 HIGH
Internet Connection Sharing (ICS) Remote Code Execution Vulnerability
CVE-2023-47080 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2023-12-15 N/A 5.5 MEDIUM
Adobe Substance 3D Stager versions 2.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-47081 3 Adobe, Apple, Microsoft 3 Substance 3d Stager, Macos, Windows 2023-12-15 N/A 5.5 MEDIUM
Adobe Substance 3D Stager versions 2.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-47079 3 Adobe, Apple, Microsoft 3 Dimension, Macos, Windows 2023-12-15 N/A 5.5 MEDIUM
Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-47078 3 Adobe, Apple, Microsoft 3 Dimension, Macos, Windows 2023-12-15 N/A 5.5 MEDIUM
Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-47062 3 Adobe, Apple, Microsoft 3 Dimension, Macos, Windows 2023-12-15 N/A 5.5 MEDIUM
Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-47061 3 Adobe, Apple, Microsoft 3 Dimension, Macos, Windows 2023-12-15 N/A 5.5 MEDIUM
Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-44362 3 Adobe, Apple, Microsoft 3 Prelude, Macos, Windows 2023-12-15 N/A 5.5 MEDIUM
Adobe Prelude versions 22.6 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-47075 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2023-12-14 N/A 7.8 HIGH
Adobe Illustrator versions 28.0 (and earlier) and 27.9 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-47063 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2023-12-14 N/A 7.8 HIGH
Adobe Illustrator versions 28.0 (and earlier) and 27.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-47074 3 Adobe, Apple, Microsoft 3 Illustrator, Macos, Windows 2023-12-14 N/A 7.8 HIGH
Adobe Illustrator versions 28.0 (and earlier) and 27.9 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-47076 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2023-12-14 N/A 5.5 MEDIUM
Adobe InDesign versions 19.0 (and earlier) and 17.4.2 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-47077 3 Adobe, Apple, Microsoft 3 Indesign, Macos, Windows 2023-12-14 N/A 5.5 MEDIUM
Adobe InDesign versions 19.0 (and earlier) and 17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-36391 1 Microsoft 1 Windows 11 23h2 2023-12-14 N/A 7.8 HIGH
Local Security Authority Subsystem Service Elevation of Privilege Vulnerability
CVE-2023-36020 1 Microsoft 1 Dynamics 365 2023-12-14 N/A 5.4 MEDIUM
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2023-35638 1 Microsoft 4 Windows Server 2012, Windows Server 2016, Windows Server 2019 and 1 more 2023-12-14 N/A 7.5 HIGH
DHCP Server Service Denial of Service Vulnerability
CVE-2023-35625 1 Microsoft 1 Azure Machine Learning Software Development Kit 2023-12-14 N/A 4.7 MEDIUM
Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability
CVE-2023-35624 1 Microsoft 1 Azure Connected Machine Agent 2023-12-14 N/A 7.3 HIGH
Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2023-35622 1 Microsoft 6 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 3 more 2023-12-14 N/A 7.5 HIGH
Windows DNS Spoofing Vulnerability
CVE-2023-35628 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2023-12-14 N/A 8.1 HIGH
Windows MSHTML Platform Remote Code Execution Vulnerability
CVE-2023-36696 1 Microsoft 9 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 6 more 2023-12-14 N/A 7.8 HIGH
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2023-35629 1 Microsoft 3 Windows 10 1507, Windows Server 2008, Windows Server 2012 2023-12-14 N/A 6.8 MEDIUM
Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability
CVE-2023-35632 1 Microsoft 9 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 6 more 2023-12-14 N/A 7.8 HIGH
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2023-35631 1 Microsoft 4 Windows 11 21h2, Windows 11 22h2, Windows 11 23h2 and 1 more 2023-12-14 N/A 7.8 HIGH
Win32k Elevation of Privilege Vulnerability
CVE-2023-35630 1 Microsoft 14 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 11 more 2023-12-14 N/A 8.8 HIGH
Internet Connection Sharing (ICS) Remote Code Execution Vulnerability
CVE-2023-35634 1 Microsoft 3 Windows 11 21h2, Windows 11 22h2, Windows 11 23h2 2023-12-14 N/A 8.8 HIGH
Windows Bluetooth Driver Remote Code Execution Vulnerability
CVE-2023-35635 1 Microsoft 2 Windows 11 22h2, Windows 11 23h2 2023-12-14 N/A 5.5 MEDIUM
Windows Kernel Denial of Service Vulnerability
CVE-2023-35636 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2023-12-14 N/A 6.5 MEDIUM
Microsoft Outlook Information Disclosure Vulnerability
CVE-2023-35619 1 Microsoft 1 Office Long Term Servicing Channel 2023-12-14 N/A 5.3 MEDIUM
Microsoft Outlook for Mac Spoofing Vulnerability
CVE-2023-24922 1 Microsoft 1 Dynamics 365 2023-12-14 N/A 6.5 MEDIUM
Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
CVE-2023-48677 2 Acronis, Microsoft 2 Cyber Protect Home Office, Windows 2023-12-14 N/A 7.8 HIGH
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40901.
CVE-2023-32028 1 Microsoft 2 Ole Db Driver For Sql Server, Sql Server 2023-12-14 N/A 7.8 HIGH
Microsoft SQL OLE DB Remote Code Execution Vulnerability
CVE-2023-45283 2 Golang, Microsoft 2 Go, Windows 2023-12-14 N/A 7.5 HIGH
The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:\ (among other effects). The previous behavior has been restored.
CVE-2023-36585 1 Microsoft 11 Windows 10 1507, Windows 10 1809, Windows 10 21h1 and 8 more 2023-12-14 N/A 7.5 HIGH
Windows upnphost.dll Denial of Service Vulnerability
CVE-2022-24767 2 Git For Windows Project, Microsoft 4 Git For Windows, Visual Studio 2017, Visual Studio 2019 and 1 more 2023-12-13 6.9 MEDIUM 7.8 HIGH
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.
CVE-2022-24464 2 Fedoraproject, Microsoft 5 Fedora, .net, .net Core and 2 more 2023-12-13 5.0 MEDIUM 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2023-33170 2 Fedoraproject, Microsoft 3 Fedora, .net, Visual Studio 2022 2023-12-13 N/A 8.1 HIGH
ASP.NET and Visual Studio Security Feature Bypass Vulnerability
CVE-2023-21808 1 Microsoft 25 .net, .net Framework, Visual Studio 2017 and 22 more 2023-12-13 N/A 7.8 HIGH
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2023-28296 1 Microsoft 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 2023-12-13 N/A 7.8 HIGH
Visual Studio Remote Code Execution Vulnerability
CVE-2023-28299 1 Microsoft 3 Visual Studio 2017, Visual Studio 2019, Visual Studio 2022 2023-12-13 N/A 5.5 MEDIUM
Visual Studio Spoofing Vulnerability
CVE-2023-33127 1 Microsoft 2 .net, Visual Studio 2022 2023-12-13 N/A 8.1 HIGH
.NET and Visual Studio Elevation of Privilege Vulnerability
CVE-2023-35618 1 Microsoft 1 Edge Chromium 2023-12-12 N/A 9.6 CRITICAL
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
CVE-2023-36880 1 Microsoft 1 Edge Chromium 2023-12-12 N/A 4.8 MEDIUM
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVE-2023-38174 1 Microsoft 1 Edge Chromium 2023-12-12 N/A 4.3 MEDIUM
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVE-2023-5808 2 Hitachi, Microsoft 2 Vantara Hitachi Network Attached Storage, Windows 2023-12-12 N/A 6.5 MEDIUM
SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in a Storage administrative role are able to access HNAS configuration backup and diagnostic data, that would normally be barred to that specific administrative role.
CVE-2023-49282 1 Microsoft 1 Graph 2023-12-12 N/A 5.3 MEDIUM
msgraph-sdk-php is the Microsoft Graph Library for PHP. The Microsoft Graph PHP SDK published packages which contained test code that enabled the use of the phpInfo() function from any application that could access and execute the file at vendor/microsoft/microsoft-graph/tests/GetPhpInfo.php. The phpInfo function exposes system information. The vulnerability affects the GetPhpInfo.php script of the PHP SDK which contains a call to the phpinfo() function. This vulnerability requires a misconfiguration of the server to be present so it can be exploited. For example, making the PHP application’s /vendor directory web accessible. The combination of the vulnerability and the server misconfiguration would allow an attacker to craft an HTTP request that executes the phpinfo() method. The attacker would then be able to get access to system information like configuration, modules, and environment variables and later on use the compromised secrets to access additional data. This problem has been patched in versions 1.109.1 and 2.0.0-RC5. If an immediate deployment with the updated vendor package is not available, you can perform the following temporary workarounds: delete the `vendor/microsoft/microsoft-graph/tests/GetPhpInfo.php` file, remove access to the `/vendor` directory, or disable the phpinfo function.
CVE-2023-49283 1 Microsoft 1 Graph 2023-12-12 N/A 5.3 MEDIUM
microsoft-graph-core the Microsoft Graph Library for PHP. The Microsoft Graph Beta PHP SDK published packages which contained test code that enabled the use of the phpInfo() function from any application that could access and execute the file at `vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php`. The phpInfo function exposes system information. The vulnerability affects the GetPhpInfo.php script of the PHP SDK which contains a call to the phpinfo() function. This vulnerability requires a misconfiguration of the server to be present so it can be exploited. For example, making the PHP application’s /vendor directory web accessible. The combination of the vulnerability and the server misconfiguration would allow an attacker to craft an HTTP request that executes the phpinfo() method. The attacker would then be able to get access to system information like configuration, modules, and environment variables and later on use the compromised secrets to access additional data. This problem has been patched in version 2.0.2. If an immediate deployment with the updated vendor package is not available, you can perform the following temporary workarounds: delete the `vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php` file, remove access to the /vendor directory, or disable the phpinfo function