Vulnerabilities (CVE)

Filtered by CWE-20
Total 9853 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-36566 1 Microsoft 1 Common Data Model Sdk 2024-11-21 N/A 6.5 MEDIUM
Microsoft Common Data Model SDK Denial of Service Vulnerability
CVE-2023-36563 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 6.5 MEDIUM
Microsoft WordPad Information Disclosure Vulnerability
CVE-2023-36505 2024-11-21 N/A 6.8 MEDIUM
Improper Input Validation vulnerability in Saturday Drive Ninja Forms Contact Form.This issue affects Ninja Forms Contact Form : from n/a through 3.6.24.
CVE-2023-36407 1 Microsoft 5 Windows 11 21h2, Windows 11 22h2, Windows 11 23h2 and 2 more 2024-11-21 N/A 7.8 HIGH
Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2023-36406 1 Microsoft 5 Windows 11 21h2, Windows 11 22h2, Windows 11 23h2 and 2 more 2024-11-21 N/A 5.5 MEDIUM
Windows Hyper-V Information Disclosure Vulnerability
CVE-2023-36049 1 Microsoft 16 .net, .net Framework, Visual Studio 2022 and 13 more 2024-11-21 N/A 7.6 HIGH
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
CVE-2023-36021 1 Microsoft 1 On-prem Data Gateway 2024-11-21 N/A 8.0 HIGH
Microsoft On-Prem Data Gateway Security Feature Bypass Vulnerability
CVE-2023-35936 2 Debian, Pandoc 2 Debian Linux, Pandoc 2024-11-21 N/A 6.1 MEDIUM
Pandoc is a Haskell library for converting from one markup format to another, and a command-line tool that uses this library. Starting in version 1.13 and prior to version 3.1.4, Pandoc is susceptible to an arbitrary file write vulnerability, which can be triggered by providing a specially crafted image element in the input when generating files using the `--extract-media` option or outputting to PDF format. This vulnerability allows an attacker to create or overwrite arbitrary files on the system ,depending on the privileges of the process running pandoc. It only affects systems that pass untrusted user input to pandoc and allow pandoc to be used to produce a PDF or with the `--extract-media` option. The fix is to unescape the percent-encoding prior to checking that the resource is not above the working directory, and prior to extracting the extension. Some code for checking that the path is below the working directory was flawed in a similar way and has also been fixed. Note that the `--sandbox` option, which only affects IO done by readers and writers themselves, does not block this vulnerability. The vulnerability is patched in pandoc 3.1.4. As a workaround, audit the pandoc command and disallow PDF output and the `--extract-media` option.
CVE-2023-35798 1 Apache 2 Apache-airflow-providers-microsoft-mssql, Apache-airflow-providers-odbc 2024-11-21 N/A 4.3 MEDIUM
Input Validation vulnerability in Apache Software Foundation Apache Airflow ODBC Provider, Apache Software Foundation Apache Airflow MSSQL Provider.This vulnerability is considered low since it requires DAG code to use `get_sqlalchemy_connection` and someone with access to connection resources specifically updating the connection to exploit it. This issue affects Apache Airflow ODBC Provider: before 4.0.0; Apache Airflow MSSQL Provider: before 3.4.1. It is recommended to upgrade to a version that is not affected
CVE-2023-35797 1 Apache 1 Apache-airflow-providers-apache-hive 2024-11-21 N/A 9.8 CRITICAL
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Hive Provider. This issue affects Apache Airflow Apache Hive Provider: before 6.1.1. Before version 6.1.1 it was possible to bypass the security check to RCE via principal parameter. For this to be exploited it requires access to modifying the connection details. It is recommended updating provider version to 6.1.1 in order to avoid this vulnerability.
CVE-2023-35619 1 Microsoft 1 Office Long Term Servicing Channel 2024-11-21 N/A 5.3 MEDIUM
Microsoft Outlook for Mac Spoofing Vulnerability
CVE-2023-35377 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 6.5 MEDIUM
Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-35376 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 6.5 MEDIUM
Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-35368 1 Microsoft 1 Exchange Server 2024-11-21 N/A 8.8 HIGH
Microsoft Exchange Remote Code Execution Vulnerability
CVE-2023-35367 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 9.8 CRITICAL
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2023-35366 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 9.8 CRITICAL
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2023-35365 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 9.8 CRITICAL
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2023-35349 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-11-21 N/A 9.8 CRITICAL
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2023-35336 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2024-11-21 N/A 6.5 MEDIUM
Windows MSHTML Platform Security Feature Bypass Vulnerability
CVE-2023-35306 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2024-11-21 N/A 5.5 MEDIUM
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability