cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-23274,https://securityvulnerability.io/vulnerability/CVE-2022-23274,Microsoft Dynamics GP Remote Code Execution Vulnerability,Microsoft Dynamics GP Remote Code Execution Vulnerability,Microsoft,Microsoft Dynamics Gp,8.8,HIGH,0.012360000051558018,false,false,false,false,,false,false,2022-02-09T16:37:27.000Z,0 CVE-2022-23273,https://securityvulnerability.io/vulnerability/CVE-2022-23273,Microsoft Dynamics GP Elevation Of Privilege Vulnerability,Microsoft Dynamics GP Elevation Of Privilege Vulnerability,Microsoft,Microsoft Dynamics Gp,7.1,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2022-02-09T16:37:25.000Z,0 CVE-2022-23272,https://securityvulnerability.io/vulnerability/CVE-2022-23272,Microsoft Dynamics GP Elevation Of Privilege Vulnerability,Microsoft Dynamics GP Elevation Of Privilege Vulnerability,Microsoft,Microsoft Dynamics Gp,8.1,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2022-02-09T16:37:24.000Z,0 CVE-2022-23271,https://securityvulnerability.io/vulnerability/CVE-2022-23271,Microsoft Dynamics GP Elevation Of Privilege Vulnerability,Microsoft Dynamics GP Elevation Of Privilege Vulnerability,Microsoft,Microsoft Dynamics Gp,6.5,MEDIUM,0.0006699999794363976,false,false,false,false,,false,false,2022-02-09T16:37:23.000Z,0 CVE-2022-23269,https://securityvulnerability.io/vulnerability/CVE-2022-23269,Microsoft Dynamics GP Spoofing Vulnerability,Microsoft Dynamics GP Spoofing Vulnerability,Microsoft,Microsoft Dynamics Gp,5.4,MEDIUM,0.07620000094175339,false,false,false,false,,false,false,2022-02-09T16:37:21.000Z,0 CVE-2010-2083,https://securityvulnerability.io/vulnerability/CVE-2010-2083,,"Microsoft Dynamics GP has a default value of ACCESS for the system password, which might make it easier for remote authenticated users to bypass intended access restrictions via unspecified vectors.",Microsoft,Dynamics Gp,,,0.0019499999471008778,false,false,false,false,,false,false,2010-05-26T19:30:00.000Z,0 CVE-2010-2011,https://securityvulnerability.io/vulnerability/CVE-2010-2011,,"Microsoft Dynamics GP uses a substitution cipher to encrypt the system password field and unspecified other fields, which makes it easier for remote authenticated users to obtain sensitive information by decrypting a field's contents.",Microsoft,Dynamics Gp,,,0.0010100000072270632,false,false,false,false,,false,false,2010-05-21T20:30:00.000Z,0 CVE-2006-5265,https://securityvulnerability.io/vulnerability/CVE-2006-5265,,Unspecified vulnerability in Microsoft Dynamics GP (formerly Great Plains) 9.0 and earlier allows remote attackers to cause a denial of service (crash) via an invalid magic number in a Distributed Process Server (DPS) message.,Microsoft,Dynamics Gp,,,0.004509999882429838,false,false,false,false,,false,false,2006-12-31T05:00:00.000Z,0 CVE-2006-5266,https://securityvulnerability.io/vulnerability/CVE-2006-5266,,"Multiple buffer overflows in Microsoft Dynamics GP (formerly Great Plains) 9.0 and earlier allow remote attackers to execute arbitrary code via (1) a crafted Distributed Process Manager (DPM) message to the (a) DPM component, or a (2) long string or (3) long IP address in a Distributed Process Server (DPS) message to the DPM or (b) DPS component.",Microsoft,Dynamics Gp,,,0.22145000100135803,false,false,false,false,,false,false,2006-12-31T05:00:00.000Z,0