U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
There are 244,176 matching records.
Displaying matches 27,361 through 27,380.
Vuln ID Summary CVSS Severity
CVE-2023-36719

Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability

Published: November 14, 2023; 1:15:50 PM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36705

Windows Installer Elevation of Privilege Vulnerability

Published: November 14, 2023; 1:15:50 PM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36641

A numeric truncation error in Fortinet FortiProxy version 7.2.0 through 7.2.4, FortiProxy version 7.0.0 through 7.0.10, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1, all versions, FortiProxy 1.0 all versions, FortiOS version 7.4.0, FortiOS version 7.2.0 through 7.2.5, FortiOS version 7.0.0 through 7.0.12, FortiOS 6.4 all versions, FortiOS 6.2 all versions, FortiOS 6.0 all versions allows attacker to denial of service via specifically crafted HTTP requests.

Published: November 14, 2023; 1:15:49 PM -0500
V4.0:(not available)
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-36633

An improper authorization vulnerability [CWE-285] in FortiMail webmail version 7.2.0 through 7.2.2 and before 7.0.5 allows an authenticated attacker to see and modify the title of address book folders of other users via crafted HTTP or HTTPs requests.

Published: November 14, 2023; 1:15:49 PM -0500
V4.0:(not available)
V3.1: 5.4 MEDIUM
V2.0:(not available)
CVE-2023-36560

ASP.NET Security Feature Bypass Vulnerability

Published: November 14, 2023; 1:15:48 PM -0500
V4.0:(not available)
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-36553

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.

Published: November 14, 2023; 1:15:48 PM -0500
V4.0:(not available)
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-36439

Microsoft Exchange Server Remote Code Execution Vulnerability

Published: November 14, 2023; 1:15:47 PM -0500
V4.0:(not available)
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2023-36428

Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability

Published: November 14, 2023; 1:15:47 PM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-36427

Windows Hyper-V Elevation of Privilege Vulnerability

Published: November 14, 2023; 1:15:46 PM -0500
V4.0:(not available)
V3.1: 7.0 HIGH
V2.0:(not available)
CVE-2023-36425

Windows Distributed File System (DFS) Remote Code Execution Vulnerability

Published: November 14, 2023; 1:15:46 PM -0500
V4.0:(not available)
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2023-36424

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Published: November 14, 2023; 1:15:45 PM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36423

Microsoft Remote Registry Service Remote Code Execution Vulnerability

Published: November 14, 2023; 1:15:45 PM -0500
V4.0:(not available)
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-36422

Microsoft Windows Defender Elevation of Privilege Vulnerability

Published: November 14, 2023; 1:15:45 PM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36413

Microsoft Office Security Feature Bypass Vulnerability

Published: November 14, 2023; 1:15:44 PM -0500
V4.0:(not available)
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-36410

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

Published: November 14, 2023; 1:15:44 PM -0500
V4.0:(not available)
V3.1: 5.4 MEDIUM
V2.0:(not available)
CVE-2023-36408

Windows Hyper-V Elevation of Privilege Vulnerability

Published: November 14, 2023; 1:15:43 PM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36407

Windows Hyper-V Elevation of Privilege Vulnerability

Published: November 14, 2023; 1:15:43 PM -0500
V4.0:(not available)
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36406

Windows Hyper-V Information Disclosure Vulnerability

Published: November 14, 2023; 1:15:42 PM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2023-36405

Windows Kernel Elevation of Privilege Vulnerability

Published: November 14, 2023; 1:15:42 PM -0500
V4.0:(not available)
V3.1: 7.0 HIGH
V2.0:(not available)
CVE-2023-36404

Windows Kernel Information Disclosure Vulnerability

Published: November 14, 2023; 1:15:42 PM -0500
V4.0:(not available)
V3.1: 5.5 MEDIUM
V2.0:(not available)