Export limit exceeded: 13754 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 10239 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Export limit exceeded: 10239 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (10239 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2023-28240 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2025-01-23 8.8 High
Windows Network Load Balancing Remote Code Execution Vulnerability
CVE-2023-28238 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 7.5 High
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
CVE-2023-28237 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-01-23 7.8 High
Windows Kernel Remote Code Execution Vulnerability
CVE-2023-28232 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 7.5 High
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-28231 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2025-01-23 8.8 High
DHCP Server Service Remote Code Execution Vulnerability
CVE-2023-28227 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 7.5 High
Windows Bluetooth Driver Remote Code Execution Vulnerability
CVE-2023-28224 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2025-01-23 7.1 High
Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability
CVE-2023-28220 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 8.1 High
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-28219 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2025-01-23 8.1 High
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-21554 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 9 more 2025-01-23 9.8 Critical
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2023-24893 1 Microsoft 1 Visual Studio Code 2025-01-23 7.8 High
Visual Studio Code Remote Code Execution Vulnerability
CVE-2023-28223 1 Microsoft 4 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 1 more 2025-01-23 6.6 Medium
Windows Domain Name Service Remote Code Execution Vulnerability
CVE-2023-28305 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2025-01-23 6.6 Medium
Windows DNS Server Remote Code Execution Vulnerability
CVE-2023-28292 1 Microsoft 5 Raw Image Extension, Windows 10 20h2, Windows 10 21h2 and 2 more 2025-01-23 7.8 High
Raw Image Extension Remote Code Execution Vulnerability
CVE-2023-28291 1 Microsoft 5 Raw Image Extension, Windows 10 20h2, Windows 10 21h2 and 2 more 2025-01-23 8.4 High
Raw Image Extension Remote Code Execution Vulnerability
CVE-2023-23375 1 Microsoft 2 Odbc, Ole Db 2025-01-23 7.8 High
Microsoft ODBC and OLE DB Remote Code Execution Vulnerability
CVE-2023-21727 1 Microsoft 12 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 9 more 2025-01-23 8.8 High
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2023-23384 1 Microsoft 1 Sql Server 2025-01-23 7.3 High
Microsoft SQL Server Remote Code Execution Vulnerability
CVE-2024-29974 1 Zyxel 4 Nas326, Nas326 Firmware, Nas542 and 1 more 2025-01-22 9.8 Critical
** UNSUPPORTED WHEN ASSIGNED ** The remote code execution vulnerability in the CGI program “file_upload-cgi” in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute arbitrary code by uploading a crafted configuration file to a vulnerable device.
CVE-2023-32314 2 Redhat, Vm2 Project 3 Acm, Multicluster Engine, Vm2 2025-01-22 9.8 Critical
vm2 is a sandbox that can run untrusted code with Node's built-in modules. A sandbox escape vulnerability exists in vm2 for versions up to and including 3.9.17. It abuses an unexpected creation of a host object based on the specification of `Proxy`. As a result a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.18` of `vm2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.