SAP CRM code execution | CVE-2023-27897
NAME__________SAP CRM code executionPlatforms Affected:SAP CRM 700 SAP CRM 701 SAP CRM 702 SAP CRM 712 SAP CRM 713Risk Level:6Exploitability:UnprovenConsequences:Gain...
NAME__________SAP CRM code executionPlatforms Affected:SAP CRM 700 SAP CRM 701 SAP CRM 702 SAP CRM 712 SAP CRM 713Risk Level:6Exploitability:UnprovenConsequences:Gain...
NAME__________Microsoft SQL Server code executionPlatforms Affected:Microsoft SQL Server 2019 for X64-based systems (CU 18) x64Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft SQL Server...
NAME__________Adobe Substance 3D Stager code executionPlatforms Affected:Adobe Substance 3D Stager 2.0.1Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Adobe Substance 3D Stager could allow a...
NAME__________Microsoft SharePoint Server spoofingPlatforms Affected:Microsoft SharePoint Enterprise Server 2016Risk Level:6.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft SharePoint Server could allow a remote authenticated attacker...
NAME__________Microsoft Windows DNS Server code executionPlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2016 Microsoft...
NAME__________Microsoft Windows DNS Server code executionPlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2016 Microsoft...
NAME__________Microsoft Office Graphics code executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft Office could allow a remote attacker to execute arbitrary code on...
NAME__________Adobe Acrobat and Adobe Reader code executionPlatforms Affected:Adobe Acrobat DC 23.001.20093 Adobe Acrobat Reader DC 23.001.20093 Adobe Acrobat 2020 20.005.30441...
NAME__________Microsoft Windows DNS Server code executionPlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2016 Microsoft...
NAME__________Microsoft Windows Kernel code executionPlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10 x32 Microsoft Windows...
NAME__________Microsoft Visual Studio spoofingPlatforms Affected:Microsoft Visual Studio 2022 17.4Risk Level:5.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft Visual Studio could allow a local authenticated attacker...
NAME__________Mozilla Firefox for Android and Focus for Android spoofingPlatforms Affected:Mozilla Firefox for Android 111 Mozilla Focus for Android 111Risk Level:6.5Exploitability:UnprovenConsequences:Gain...
NAME__________Microsoft Publisher code executionPlatforms Affected:Microsoft Publisher 2016 x32 Microsoft Publisher 2016 x64Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft Publisher could allow a remote...
NAME__________Microsoft Publisher code executionPlatforms Affected:Microsoft Publisher 2016 x64Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Microsoft Publisher could allow a remote attacker to execute arbitrary...
NAME__________Adobe Acrobat and Adobe Reader code executionPlatforms Affected:Adobe Acrobat DC 23.001.20093 Adobe Acrobat Reader DC 23.001.20093 Adobe Acrobat 2020 20.005.30441...
NAME__________Fortinet FortiWeb and FortiADC command executionPlatforms Affected:Risk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Fortinet FortiWeb and FortiADC could allow a local authenticated attacker to...
NAME__________Fortinet FortiOS and FortiProxy open redirectPlatforms Affected:Risk Level:4.1Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Fortinet FortiOS and FortiProxy could allow a remote authenticated attacker to...
NAME__________Fortinet FortiOS and FortiProxy brute forcePlatforms Affected:Risk Level:6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Fortinet FortiOS and FortiProxy is vulnerable to a brute force attack,...
NAME__________Fortinet FortiClient (Windows) code executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________FortiClient (Windows) could allow a local authenticated attacker to execute arbitrary code...
NAME__________Fortinet FortiADC, Fortinet FortiDDoS, and Fortinet FortiDDoS-F command executionPlatforms Affected:Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Fortinet FortiADC, Fortinet FortiDDoS, and Fortinet FortiDDoS-F could...
NAME__________Fortinet FortiSOAR code executionPlatforms Affected:Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Fortinet FortiSOAR could allow a remote authenticated attacker to execute arbitrary code on...
NAME__________Veritas Appliance HTTP header injectionPlatforms Affected:Veritas Appliance 4.1.0.1Risk Level:6.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Veritas Appliance is vulnerable to HTTP header injection, caused by...
NAME__________Cisco Evolved Programmable Network Manager, Identity Services Engine and Prime Infrastructure command executionPlatforms Affected:Cisco Prime Infrastructure Cisco Identity Services Engine...
NAME__________Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers command executionPlatforms Affected:Cisco RV016 Multi-WAN VPN Routers Cisco RV042...