Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2023-28197 | An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, macOS Monterey 12.6.4. An app may be able to access user-sensitive data. | Unknown | N/A | Apple | |
CVE-2023-28198 | A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3. Processing web content may lead to arbitrary code execution. | Unknown | N/A | Apple | |
CVE-2023-28199 | An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3. An app may be able to disclose kernel memory. | Unknown | N/A | Apple | |
CVE-2023-2820 | An information disclosure vulnerability in the faye endpoint in Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) could be used by an attacker on an adjacent network to obtain credentials to integrated services via a man-in-the-middle position or cryptanalysis of the session traffic. An attacker could use these credentials to impersonate PTR/TRAP to these services. All versions prior to 5.10.0 are affected. | Unknown | N/A | Proofpoint | |
CVE-2023-28200 | A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Ventura 13.3, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. An app may be able to disclose kernel memory. | Unknown | N/A | Apple | |
CVE-2023-28201 | This issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4. A remote user may be able to cause unexpected app termination or arbitrary code execution. | Unknown | N/A | Apple | |
CVE-2023-28202 | This issue was addressed with improved state management. This issue is fixed in iOS 16.5 and iPadOS 16.5, watchOS 9.5, tvOS 16.5, macOS Ventura 13.4. An app firewall setting may not take effect after exiting the Settings app. | Unknown | N/A | Apple | |
CVE-2023-28203 | The issue was addressed with improved checks. This issue is fixed in Apple Music 4.2.0 for Android. An app may be able to access contacts. | Unknown | N/A | Apple | |
CVE-2023-28204 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited. | Unknown | N/A | Apple | |
CVE-2023-28205 | A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. | Unknown | N/A | Apple | |
CVE-2023-28206 | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1, iOS 15.7.5 and iPadOS 15.7.5, macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. | Unknown | N/A | Apple | |
CVE-2023-28208 | A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. A user may send a text from a secondary eSIM despite configuring a contact to use a primary eSIM. | Unknown | N/A | Apple | |
CVE-2023-28209 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | Unknown | N/A | Apple | |
CVE-2023-28210 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | Unknown | N/A | Apple | |
CVE-2023-28211 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | Unknown | N/A | Apple | |
CVE-2023-28212 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | Unknown | N/A | Apple | |
CVE-2023-28213 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | Unknown | N/A | Apple | |
CVE-2023-28214 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | Unknown | N/A | Apple | |
CVE-2023-28215 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | Unknown | N/A | Apple | |
CVE-2023-28216 | Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28217 | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28218 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28219 | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-2822 | A vulnerability was found in Ellucian Ethos Identity up to 5.10.5. It has been classified as problematic. Affected is an unknown function of the file /cas/logout. The manipulation of the argument url leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.10.6 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-229596. | Unknown | N/A | Ellucian | |
CVE-2023-28220 | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28221 | Windows Error Reporting Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28222 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28223 | Windows Domain Name Service Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28224 | Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28225 | Windows NTLM Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28226 | Windows Enroll Engine Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28227 | Windows Bluetooth Driver Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28228 | Windows Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28229 | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-2823 | A vulnerability was found in SourceCodester Class Scheduling System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit_subject.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229597 was assigned to this vulnerability. | Unknown | N/A | SourceCodester | |
CVE-2023-28231 | DHCP Server Service Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28232 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28233 | Windows Secure Channel Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28234 | Windows Secure Channel Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28235 | Windows Lock Screen Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28236 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28237 | Windows Kernel Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28238 | Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-2824 | A vulnerability was found in SourceCodester Dental Clinic Appointment Reservation System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/service.php of the component POST Parameter Handler. The manipulation of the argument service leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-229598 is the identifier assigned to this vulnerability. | Unknown | N/A | SourceCodester | |
CVE-2023-28240 | Windows Network Load Balancing Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28241 | Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28243 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28244 | Windows Kerberos Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28246 | Windows Registry Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28247 | Windows Network File System Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28248 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28249 | Windows Boot Manager Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-2825 | An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups. | Unknown | N/A | GitLab | |
CVE-2023-28250 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28251 | Windows Driver Revocation List Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28252 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28253 | Windows Kernel Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28254 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28255 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28256 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-2826 | A vulnerability has been found in SourceCodester Class Scheduling System 1.0 and classified as problematic. This vulnerability affects unknown code of the file search_teacher_result.php of the component POST Parameter Handler. The manipulation of the argument teacher leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229612. | Unknown | N/A | SourceCodester | |
CVE-2023-28260 | .NET DLL Hijacking Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28261 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28262 | Visual Studio Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28263 | Visual Studio Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28266 | Windows Common Log File System Driver Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28267 | Remote Desktop Protocol Client Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28268 | Netlogon RPC Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28269 | Windows Boot Manager Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-2827 | SAP Plant Connectivity - version 15.5 (PCo) or the Production Connector for SAP Digital Manufacturing - version 1.0, do not validate the signature of the JSON Web Token (JWT) in the HTTP request sent from SAP Digital Manufacturing. Therefore, unauthorized callers from the internal network could send service requests to PCo or the Production Connector, which could have an impact on the integrity of the integration with SAP Digital Manufacturing. | Unknown | N/A | SAP_SE | |
CVE-2023-28270 | Windows Lock Screen Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28271 | Windows Kernel Memory Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28272 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28273 | Windows Clip Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28274 | Windows Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28275 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28276 | Windows Group Policy Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28277 | Windows DNS Server Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28278 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-2828 | Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1. | Unknown | N/A | ISC | |
CVE-2023-28283 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28284 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28285 | Microsoft Office Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28286 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28287 | Microsoft Publisher Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28288 | Microsoft SharePoint Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-2829 | A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (`synth-from-dnssec`) enabled can be remotely terminated using a zone with a malformed NSEC record. This issue affects BIND 9 versions 9.16.8-S1 through 9.16.41-S1 and 9.18.11-S1 through 9.18.15-S1. | Unknown | N/A | ISC | |
CVE-2023-28290 | Microsoft Remote Desktop app for Windows Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28291 | Raw Image Extension Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28292 | Raw Image Extension Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28293 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28295 | Microsoft Publisher Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28296 | Visual Studio Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28297 | Windows Remote Procedure Call Service (RPCSS) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28298 | Windows Kernel Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28299 | Visual Studio Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-2830 | Cross-Site Request Forgery (CSRF) vulnerability in Trustindex.Io WP Testimonials plugin <= 1.4.2 versions. | Unknown | N/A | Trustindex.io | |
CVE-2023-28300 | Azure Service Connector Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28301 | Microsoft Edge (Chromium-based) Tampering Vulnerability | Unknown | N/A | Microsoft | |
CVE-2023-28302 | Microsoft Message Queuing Denial of Service Vulnerability | Unknown | N/A | Microsoft |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v