Description
Visual Studio Remote Code Execution Vulnerability
Base Score: 8.4 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23381
Description
Windows Graphics Component Remote Code Execution Vulnerability
Base Score: 7.8 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21823
Description
Visual Studio Remote Code Execution Vulnerability
Base Score: 8.4 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21815
Description
.NET and Visual Studio Remote Code Execution Vulnerability
Base Score: 7.8 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808
______________________________________________________
Description
Microsoft Dynamics Unified Service Desk Remote Code Execution Vulnerability
Base Score: 8.3 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21778
Description
Visual Studio Elevation of Privilege Vulnerability
Base Score: 7.8 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21566
Description
Azure DevOps Server Remote Code Execution Vulnerability
Base Score: 7.5 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21553
Description
Print 3D Remote Code Execution Vulnerability
Base Score: 7.8 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23378
Description
3D Builder Remote Code Execution Vulnerability
Base Score: 7.8 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23377
Description
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Base Score: 7.8 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23376
Description
3D Builder Remote Code Execution Vulnerability
Base Score: 7.8 HIGH
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23390
CVE-2021-3120 Description An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premium plugin before 3.3.1 for WordPress allows remote attackers to achieve remote code execution on the operating system in the security context of the web server. In order to exploit this vulnerability, an attacker must be able to place a valid Gift […]
CVE-2023-22417 Description A Missing Release of Memory after Effective Lifetime vulnerability in the Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). In an IPsec VPN environment, a memory leak will be seen if a DH or ECDH group is configured. Eventually the […]
CVE-2022-2196 Description A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn’t need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code […]
Leave a Reply