Filtered by CWE-20
Total 12840 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-24856 1 Microsoft 12 Windows 10, Windows 10 1607, Windows 10 1809 and 9 more 2025-02-28 7.5 High
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-28302 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 9 more 2025-02-28 7.5 High
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVE-2023-28304 1 Microsoft 2 Odbc, Ole Db 2025-02-28 7.8 High
Microsoft ODBC and OLE DB Remote Code Execution Vulnerability
CVE-2023-32057 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-02-28 9.8 Critical
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2023-36888 1 Microsoft 1 Edge Chromium 2025-02-28 6.3 Medium
Microsoft Edge for Android (Chromium-based) Tampering Vulnerability
CVE-2023-28301 1 Microsoft 1 Edge 2025-02-28 3.7 Low
Microsoft Edge (Chromium-based) Tampering Vulnerability
CVE-2022-20542 1 Google 1 Android 2025-02-28 7.8 High
In parseParamsBlob of types.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238083570
CVE-2023-24865 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-02-28 6.5 Medium
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24866 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-02-28 6.5 Medium
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-35306 1 Microsoft 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more 2025-02-28 5.5 Medium
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2022-3767 1 Gitlab 1 Dynamic Application Security Testing Analyzer 2025-02-28 7.7 High
Missing validation in DAST analyzer affecting all versions from 1.11.0 prior to 3.0.32, allows custom request headers to be sent with every request, regardless of the host.
CVE-2023-22934 1 Splunk 2 Splunk, Splunk Cloud Platform 2025-02-28 7.3 High
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘pivot’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands using a saved search job. The vulnerability requires an authenticated user to craft the saved job and a higher privileged user to initiate a request within their browser.
CVE-2024-29946 1 Splunk 2 Cloud, Splunk 2025-02-28 8.1 High
In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, the Dashboard Examples Hub lacks protections for risky SPL commands. This could let attackers bypass SPL safeguards for risky commands in the Hub. The vulnerability would require the attacker to phish the victim by tricking them into initiating a request within their browser.
CVE-2023-22939 1 Splunk 2 Splunk, Splunk Cloud Platform 2025-02-28 8.1 High
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘map’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled.
CVE-2023-22940 1 Splunk 2 Splunk, Splunk Cloud Platform 2025-02-28 6.3 Medium
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, aliases of the ‘collect’ search processing language (SPL) command, including ‘summaryindex’, ‘sumindex’, ‘stash’,’ mcollect’, and ‘meventcollect’, were not designated as safeguarded commands. The commands could potentially allow for the exposing of data to a summary index that unprivileged users could access. The vulnerability requires a higher privileged user to initiate a request within their browser, and only affects instances with Splunk Web enabled.
CVE-2024-22165 1 Splunk 1 Enterprise Security 2025-02-28 6.5 Medium
In Splunk Enterprise Security (ES) versions lower than 7.1.2, an attacker can create a malformed Investigation to perform a denial of service (DoS). The malformed investigation prevents the generation and rendering of the Investigations manager until it is deleted.<br>The vulnerability requires an authenticated session and access to create an Investigation. It only affects the availability of the Investigations manager, but without the manager, the Investigations functionality becomes unusable for most users.
CVE-2023-22937 1 Splunk 2 Splunk, Splunk Cloud Platform 2025-02-28 4.3 Medium
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the lookup table upload feature let a user upload lookup tables with unnecessary filename extensions. Lookup table file extensions may now be one of the following only: .csv, .csv.gz, .kmz, .kml, .mmdb, or .mmdb.gzl.
CVE-2023-35368 1 Microsoft 1 Exchange Server 2025-02-27 8.8 High
Microsoft Exchange Remote Code Execution Vulnerability
CVE-2023-36912 1 Microsoft 12 Windows 10, Windows 10 1607, Windows 10 1809 and 9 more 2025-02-27 7.5 High
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVE-2023-35376 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-02-27 6.5 Medium
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability