Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-27875 |
IBM Aspera Faspex 5.0.4 could allow a user to change other user's credentials due to improper access controls. IBM X-Force ID: 249847. Published: March 16, 2023; 9:15:10 AM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-24671 |
VX Search v13.8 and v14.7 was discovered to contain an unquoted service path vulnerability which allows attackers to execute arbitrary commands at elevated privileges via a crafted executable file. Published: March 16, 2023; 8:15:11 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-25148 |
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to exploit the vulnerability by changing a specific file into a pseudo-symlink, allowing privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: March 10, 2023; 4:15:15 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-25147 |
An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process. Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this. Published: March 10, 2023; 4:15:15 PM -0500 |
V3.1: 6.7 MEDIUM V2.0:(not available) |
CVE-2023-25146 |
A security agent link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to quarantine a file, delete the original folder and replace with a junction to an arbitrary location, ultimately leading to an arbitrary file dropped to an arbitrary location. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: March 10, 2023; 4:15:15 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-25145 |
A link following vulnerability in the scanning function of Trend Micro Apex One agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Published: March 10, 2023; 4:15:15 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-25144 |
An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership. Published: March 10, 2023; 4:15:14 PM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-25143 |
An uncontrolled search path element vulnerability in the Trend Micro Apex One Server installer could allow an attacker to achieve a remote code execution state on affected products. Published: March 10, 2023; 4:15:14 PM -0500 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-0193 |
NVIDIA CUDA Toolkit SDK contains a vulnerability in cuobjdump, where a local user running the tool against a malicious binary may cause an out-of-bounds read, which may result in a limited denial of service and limited information disclosure. Published: March 10, 2023; 4:15:14 PM -0500 |
V3.1: 4.4 MEDIUM V2.0:(not available) |
CVE-2023-1217 |
Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) Published: March 07, 2023; 5:15:09 PM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-1188 |
A vulnerability was found in FabulaTech Webcam for Remote Desktop 2.8.42. It has been classified as problematic. Affected is an unknown function in the library ftwebcam.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222360. Published: March 06, 2023; 3:15:08 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-1187 |
A vulnerability was found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This issue affects some unknown processing in the library ftwebcam.sys of the component Global Variable Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222359. Published: March 06, 2023; 3:15:08 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-1186 |
A vulnerability has been found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This vulnerability affects unknown code in the library ftwebcam.sys of the component IoControlCode Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-222358 is the identifier assigned to this vulnerability. Published: March 06, 2023; 3:15:08 AM -0500 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-0196 |
NVIDIA CUDA Toolkit SDK contains a bug in cuobjdump, where a local user running the tool against an ill-formed binary may cause a null- pointer dereference, which may result in a limited denial of service. Published: March 01, 2023; 9:15:41 PM -0500 |
V3.1: 3.3 LOW V2.0:(not available) |
CVE-2023-26281 |
IBM HTTP Server 8.5 used by IBM WebSphere Application Server could allow a remote user to cause a denial of service using a specially crafted URL. IBM X-Force ID: 248296. Published: March 01, 2023; 3:15:14 AM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-41722 |
A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b". Published: February 28, 2023; 1:15:09 PM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-3884 |
Incorrect Default Permissions vulnerability in Hitachi Ops Center Analyzer on Windows (Hitachi Ops Center Analyzer RAID Agent component) allows local users to read and write specific files.This issue affects Hitachi Ops Center Analyzer: from 10.9.0-00 before 10.9.0-01. Published: February 27, 2023; 10:15:09 PM -0500 |
V3.1: 7.1 HIGH V2.0:(not available) |
CVE-2023-1048 |
A vulnerability, which was classified as critical, has been found in TechPowerUp Ryzen DRAM Calculator 1.2.0.5. This issue affects some unknown processing in the library WinRing0x64.sys. The manipulation leads to improper initialization. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221807. Published: February 26, 2023; 8:15:10 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-1004 |
A vulnerability has been found in MarkText up to 0.17.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component WSH JScript Handler. The manipulation leads to code injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221737 was assigned to this vulnerability. Published: February 24, 2023; 3:15:11 AM -0500 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-0932 |
Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Published: February 22, 2023; 3:15:12 PM -0500 |
V3.1: 8.8 HIGH V2.0:(not available) |