Filtered by vendor Microsoft
Subscriptions
Total
20792 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-33153 | 1 Microsoft | 2 365 Apps, Office | 2025-02-28 | 6.8 Medium |
Microsoft Outlook Remote Code Execution Vulnerability | ||||
CVE-2023-33165 | 1 Microsoft | 1 Sharepoint Server | 2025-02-28 | 4.3 Medium |
Microsoft SharePoint Server Security Feature Bypass Vulnerability | ||||
CVE-2023-32039 | 1 Microsoft | 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more | 2025-02-28 | 5.5 Medium |
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | ||||
CVE-2023-32040 | 1 Microsoft | 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more | 2025-02-28 | 5.5 Medium |
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | ||||
CVE-2023-35324 | 1 Microsoft | 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more | 2025-02-28 | 5.5 Medium |
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | ||||
CVE-2023-35341 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-02-28 | 6.2 Medium |
Microsoft DirectMusic Information Disclosure Vulnerability | ||||
CVE-2023-35347 | 1 Microsoft | 5 Windows 10 21h2, Windows 10 22h2, Windows 11 21h2 and 2 more | 2025-02-28 | 7.1 High |
Microsoft Install Service Elevation of Privilege Vulnerability | ||||
CVE-2023-33156 | 1 Microsoft | 1 Malware Protection Engine | 2025-02-28 | 6.3 Medium |
Microsoft Defender Elevation of Privilege Vulnerability | ||||
CVE-2023-33162 | 1 Microsoft | 3 365 Apps, Office, Office Online Server | 2025-02-28 | 5.5 Medium |
Microsoft Excel Information Disclosure Vulnerability | ||||
CVE-2023-33171 | 1 Microsoft | 1 Dynamics 365 | 2025-02-28 | 8.2 High |
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | ||||
CVE-2023-32052 | 1 Microsoft | 1 Power Apps | 2025-02-28 | 5.4 Medium |
Microsoft Power Apps (online) Spoofing Vulnerability | ||||
CVE-2023-32083 | 1 Microsoft | 3 Windows Server 2016, Windows Server 2019, Windows Server 2022 | 2025-02-28 | 6.5 Medium |
Microsoft Failover Cluster Information Disclosure Vulnerability | ||||
CVE-2023-32085 | 1 Microsoft | 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more | 2025-02-28 | 5.5 Medium |
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | ||||
CVE-2023-35296 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-02-28 | 6.5 Medium |
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | ||||
CVE-2023-35306 | 1 Microsoft | 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more | 2025-02-28 | 5.5 Medium |
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | ||||
CVE-2023-35335 | 1 Microsoft | 1 Dynamics 365 | 2025-02-28 | 8.2 High |
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | ||||
CVE-2023-33151 | 1 Microsoft | 2 365 Apps, Office | 2025-02-28 | 6.5 Medium |
Microsoft Outlook Spoofing Vulnerability | ||||
CVE-2023-40596 | 2 Microsoft, Splunk | 2 Windows, Splunk | 2025-02-28 | 7 High |
In Splunk Enterprise versions earlier than 8.2.12, 9.0.6, and 9.1.1, a dynamic link library (DLL) that ships with Splunk Enterprise references an insecure path for the OPENSSLDIR build definition. An attacker can abuse this reference and subsequently install malicious code to achieve privilege escalation on the Windows machine. | ||||
CVE-2024-36991 | 2 Microsoft, Splunk | 2 Windows, Splunk | 2025-02-28 | 7.5 High |
In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows. | ||||
CVE-2024-45731 | 2 Microsoft, Splunk | 3 Windows, Splunk, Splunk Enterprise | 2025-02-28 | 8 High |
In Splunk Enterprise for Windows versions below 9.3.1, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could write a file to the Windows system root directory, which has a default location in the Windows System32 folder, when Splunk Enterprise for Windows is installed on a separate drive. |