Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Dynamics Gp
Total 9 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-23274 1 Microsoft 1 Dynamics Gp 2024-02-04 6.5 MEDIUM 8.8 HIGH
Microsoft Dynamics GP Remote Code Execution Vulnerability
CVE-2022-23271 1 Microsoft 1 Dynamics Gp 2024-02-04 9.0 HIGH 6.5 MEDIUM
Microsoft Dynamics GP Elevation Of Privilege Vulnerability
CVE-2022-23273 1 Microsoft 1 Dynamics Gp 2024-02-04 9.0 HIGH 7.1 HIGH
Microsoft Dynamics GP Elevation Of Privilege Vulnerability
CVE-2022-23272 1 Microsoft 1 Dynamics Gp 2024-02-04 9.0 HIGH 8.1 HIGH
Microsoft Dynamics GP Elevation Of Privilege Vulnerability
CVE-2022-23269 1 Microsoft 1 Dynamics Gp 2024-02-04 4.3 MEDIUM 5.4 MEDIUM
Microsoft Dynamics GP Spoofing Vulnerability
CVE-2010-2011 1 Microsoft 1 Dynamics Gp 2024-02-04 4.0 MEDIUM N/A
Microsoft Dynamics GP uses a substitution cipher to encrypt the system password field and unspecified other fields, which makes it easier for remote authenticated users to obtain sensitive information by decrypting a field's contents.
CVE-2010-2083 1 Microsoft 1 Dynamics Gp 2024-02-04 4.0 MEDIUM N/A
Microsoft Dynamics GP has a default value of ACCESS for the system password, which might make it easier for remote authenticated users to bypass intended access restrictions via unspecified vectors.
CVE-2006-5265 1 Microsoft 1 Dynamics Gp 2024-02-04 5.0 MEDIUM N/A
Unspecified vulnerability in Microsoft Dynamics GP (formerly Great Plains) 9.0 and earlier allows remote attackers to cause a denial of service (crash) via an invalid magic number in a Distributed Process Server (DPS) message.
CVE-2006-5266 1 Microsoft 1 Dynamics Gp 2024-02-04 7.5 HIGH N/A
Multiple buffer overflows in Microsoft Dynamics GP (formerly Great Plains) 9.0 and earlier allow remote attackers to execute arbitrary code via (1) a crafted Distributed Process Manager (DPM) message to the (a) DPM component, or a (2) long string or (3) long IP address in a Distributed Process Server (DPS) message to the DPM or (b) DPS component.