Page 12 of 446 results (0.007 seconds)

CVSS: 7.8EPSS: 1%CPEs: 3EXPL: 1

Microsoft Word Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DOCX files. Crafted data in a DOCX file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Microsoft Word appears to suffer from a remote code execution vulnerability when a user load a malicious file that reaches out to an attacker-controller server to get a hostile payload. • https://www.exploit-db.com/exploits/51376 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28311 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 21EXPL: 0

Windows Graphics Component Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24910 • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 1

Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel 365 MSO version 2302 build 16.0.16130.20186 64-bit suffers from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/51328 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23399 • CWE-125: Out-of-bounds Read •

CVSS: 7.1EPSS: 0%CPEs: 8EXPL: 0

Microsoft Excel Spoofing Vulnerability Microsoft Excel suffers from a spoofing vulnerability. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23398 •

CVSS: 9.8EPSS: 90%CPEs: 6EXPL: 25

Microsoft Outlook Elevation of Privilege Vulnerability Microsoft Office Outlook contains a privilege escalation vulnerability that allows for a NTLM Relay attack against another service to authenticate as the user. • https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY https://github.com/ahmedkhlief/CVE-2023-23397-POC https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook https://github.com/Pushkarup/CVE-2023-23397 https://github.com/Cyb3rMaddy/CVE-2023-23397-Report https://github.com/api0cradle/CVE-2023-23397-POC-Powershell https://github.com/Trackflaw/CVE-2023-23397 https://github.com/ka7ana/CVE-2023-23397 https://github.com/tiepologian/CVE-2023-23397 https://gith • CWE-20: Improper Input Validation CWE-294: Authentication Bypass by Capture-replay •