2023 Advisories Archive

Sort By: 2025  2024  2023  2022  2021  2020  2019  2018  2017  2016  2015  2014  2013  2012  2011  2010  2009  2008  2007  2006  2005  2004  1999  1998  

Security Gateway R75 and above

Security Advisories Subscription



Severity Date Published Date Updated Check Point Reference Source Industry Reference Description
High 4 Apr 2023 20 Mar 2025 CPAI-2020-3794 CVE-2020-5741
Plex Media Server Remote Code Execution (CVE-2020-5741)
High 1 Jun 2023 10 Mar 2025 CPAI-2022-1548 CVE-2022-43769
Hitachi Vantara Pentaho Business Analytics Server Remote Code Execution (CVE-2022-43769)
Critical 29 Aug 2023 5 Mar 2025 CPAI-2023-0686 CVE-2022-28491
CVE-2022-28495
CVE-2022-40847
CVE-2023-1457
CVE-2023-1458
CVE-2023-24154
CVE-2023-24159
CVE-2023-31569
CVE-2023-31856
CVE-2023-33486
CVE-2023-36457
CVE-2023-38862
CVE-2023-38863
CVE-2023-38864
Generic HTTP Command Injection (CVE-2022-28491; CVE-2022-28495; CVE-2022-40847; CVE-2023-1457; CVE-2023-1458; CVE-2023-24154; CVE-2023-24159; CVE-2023-31569; CVE-2023-31856; CVE-2023-33486; CVE-2023-36457; CVE-2023-38862; CVE-2023-38863; CVE-2023-38864)
Critical 13 Apr 2023 4 Mar 2025 CPAI-2022-1430 CVE-2022-43939
Hitachi Vantara Pentaho Business Analytics Server Authentication Bypass (CVE-2022-43939)
High 23 Nov 2023 3 Mar 2025 CPAI-2023-1239 CVE-2023-36025
Microsoft Windows SmartScreen Security Feature Bypass (CVE-2023-36025)
High 31 May 2023 26 Feb 2025 CPAI-2019-2903 CVE-2019-9122
CVE-2020-10213
CVE-2020-10215
CVE-2020-10216
CVE-2024-57595
D-Link DIR-825 Command Injection (CVE-2019-9122; CVE-2020-10213; CVE-2020-10215; CVE-2020-10216; CVE-2024-57595)
High 12 Dec 2023 23 Feb 2025 CPAI-2023-1277 Microsoft CVE-2023-35631 CVE-2023-35631
Microsoft Win32k Elevation of Privilege (CVE-2023-35631)
High 12 Dec 2023 23 Feb 2025 CPAI-2023-1275 Microsoft CVE-2023-35633 CVE-2023-35633
Microsoft Windows Kernel Elevation of Privilege (CVE-2023-35633)
High 14 Nov 2023 23 Feb 2025 CPAI-2023-1155 Adobe APSB23-54 CVE-2023-44337
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-54: CVE-2023-44337)
High 14 Nov 2023 23 Feb 2025 CPAI-2023-1150 Adobe APSB23-54 CVE-2023-44358
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-54: CVE-2023-44358)
High 14 Nov 2023 23 Feb 2025 CPAI-2023-1149 Adobe APSB23-54 CVE-2023-44359
Adobe Acrobat and Reader Use After Free (APSB23-54: CVE-2023-44359)
High 14 Nov 2023 23 Feb 2025 CPAI-2023-1151 Adobe APSB23-54 CVE-2023-44357
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-54: CVE-2023-44357)
High 14 Nov 2023 23 Feb 2025 CPAI-2023-1144 Adobe APSB23-54 CVE-2023-44367
Adobe Acrobat and Reader Use After Free (APSB23-54: CVE-2023-44367)
High 14 Nov 2023 23 Feb 2025 CPAI-2023-1141 Adobe APSB23-54 CVE-2023-44338
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-54: CVE-2023-44338)
High 14 Nov 2023 23 Feb 2025 CPAI-2023-1140 Adobe APSB23-54 CVE-2023-44356
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-54: CVE-2023-44356)
High 14 Nov 2023 23 Feb 2025 CPAI-2023-1136 Adobe APSB23-54 CVE-2023-44361
Adobe Acrobat and Reader Use After Free (APSB23-54: CVE-2023-44361)
High 14 Nov 2023 23 Feb 2025 CPAI-2023-1135 Adobe APSB23-54 CVE-2023-44340
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-54: CVE-2023-44340)
High 14 Nov 2023 23 Feb 2025 CPAI-2023-1013 Microsoft CVE-2023-36399 CVE-2023-36399
Microsoft Windows Storage Elevation of Privilege (CVE-2023-36399)
High 10 Oct 2023 23 Feb 2025 CPAI-2023-0889 Microsoft CVE-2023-38159 CVE-2023-38159
Microsoft Windows Graphics Component Elevation of Privilege (CVE-2023-38159)
High 10 Oct 2023 23 Feb 2025 CPAI-2023-0888 Microsoft CVE-2023-41772 CVE-2023-41772
Microsoft Win32k Elevation of Privilege (CVE-2023-41772)
High 10 Oct 2023 23 Feb 2025 CPAI-2023-0887 Microsoft CVE-2023-36776 CVE-2023-36776
Microsoft Win32k Elevation of Privilege (CVE-2023-36776)
High 10 Oct 2023 23 Feb 2025 CPAI-2023-0885 Microsoft CVE-2023-36594 CVE-2023-36594
Microsoft Windows Graphics Component Elevation of Privilege (CVE-2023-36594)
High 10 Oct 2023 23 Feb 2025 CPAI-2023-0883 Microsoft CVE-2023-36731 CVE-2023-36731
Microsoft Win32k Elevation of Privilege (CVE-2023-36731)
High 12 Sep 2023 23 Feb 2025 CPAI-2023-0757 Microsoft CVE-2023-38144 CVE-2023-38144
Microsoft Windows Common Log File System Driver Elevation of Privilege (CVE-2023-38144)
High 12 Sep 2023 23 Feb 2025 CPAI-2023-0756 Microsoft CVE-2023-38143 CVE-2023-38143
Microsoft Windows Common Log File System Driver Elevation of Privilege (CVE-2023-38143)
High 11 Dec 2023 23 Feb 2025 CPAI-2022-1734 CVE-2022-44666
Microsoft Windows Remote Code Execution (CVE-2022-44666)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0663 Adobe APSB23-30 CVE-2023-38236
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-30: CVE-2023-38236)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0660 Adobe APSB23-30 CVE-2023-38248
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-30: CVE-2023-38248)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0658 Adobe APSB23-30 CVE-2023-38237
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-30: CVE-2023-38237)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0655 Adobe APSB23-30 CVE-2023-38234
Adobe Acrobat and Reader Access of Uninitialized Pointer (APSB23-30: CVE-2023-38234)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0654 Adobe APSB23-30 CVE-2023-38231
Adobe Acrobat and Reader Out-of-bounds Write (APSB23-30: CVE-2023-38231)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0653 Adobe APSB23-30 CVE-2023-38235
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-30: CVE-2023-38235)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0652 Adobe APSB23-30 CVE-2023-38223
Adobe Acrobat and Reader Access of Uninitialized Pointer (APSB23-30: CVE-2023-38223)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0650 Adobe APSB23-30 CVE-2023-38239
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-30: CVE-2023-38239)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0647 Adobe APSB23-30 CVE-2023-38243
Adobe Acrobat and Reader Use After Free (APSB23-30: CVE-2023-38243)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0645 Adobe APSB23-30 CVE-2023-38247
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-30: CVE-2023-38247)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0648 Adobe APSB23-30 CVE-2023-38229
Adobe Acrobat and Reader Out-of-bounds Read (APSB23-30: CVE-2023-38229)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0642 Adobe APSB23-30 CVE-2023-38224
Adobe Acrobat and Reader Use After Free (APSB23-30: CVE-2023-38224)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0640 Adobe APSB23-30 CVE-2023-38222
Adobe Acrobat and Reader Use After Free (APSB23-30: CVE-2023-38222)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0638 Adobe APSB23-30 CVE-2023-38227
Adobe Acrobat and Reader Use After Free (APSB23-30: CVE-2023-38227)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0636 Adobe APSB23-30 CVE-2023-38225
Adobe Acrobat and Reader Use After Free (APSB23-30: CVE-2023-38225)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0635 Adobe APSB23-30 CVE-2023-29303
Adobe Acrobat and Reader Use After Free (APSB23-30: CVE-2023-29303)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0591 Microsoft CVE-2023-35386 CVE-2023-35386
Microsoft Windows Kernel Elevation of Privilege (CVE-2023-35386)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0590 Microsoft CVE-2023-36900 CVE-2023-36900
Microsoft Windows Common Log File System Driver Elevation of Privilege (CVE-2023-36900)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0589 Microsoft CVE-2023-35359 CVE-2023-35359
Microsoft Windows Kernel Elevation of Privilege (CVE-2023-35359)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0588 Microsoft CVE-2023-35382 CVE-2023-35382
Microsoft Windows Kernel Elevation of Privilege (CVE-2023-35382)
High 8 Aug 2023 23 Feb 2025 CPAI-2023-0587 Microsoft CVE-2023-35380 CVE-2023-35380
Microsoft Windows Kernel Elevation of Privilege (CVE-2023-35380)
High 11 Jul 2023 23 Feb 2025 CPAI-2023-0535 Microsoft CVE-2023-36874 CVE-2023-36874
Microsoft Windows Error Reporting Service Elevation of Privilege (CVE-2023-36874)
High 11 Apr 2023 23 Feb 2025 CPAI-2023-0215 Adobe APSB23-24 CVE-2023-26419
Adobe Acrobat and Reader Use After Free (APSB23-24: CVE-2023-26419)
High 11 Apr 2023 23 Feb 2025 CPAI-2023-0212 Adobe APSB23-24 CVE-2023-26423
Adobe Acrobat and Reader Use After Free (APSB23-24: CVE-2023-26423)
×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK