Page 2 of 258 results (0.003 seconds)

CVSS: 10.0EPSS: 13%CPEs: 4EXPL: 0

09 Jul 2024 — Microsoft Outlook Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Office • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38021 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

09 Jul 2024 — Microsoft Outlook Spoofing Vulnerability Vulnerabilidad de suplantación de Microsoft Outlook • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38020 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 1

11 Jun 2024 — Microsoft Office Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Office Microsoft Office 365 appears susceptible to macro code execution that can result in remote code execution. • https://packetstorm.news/files/id/179394 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 9.0EPSS: 16%CPEs: 8EXPL: 0

11 Jun 2024 — Microsoft Outlook Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Outlook • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30103 • CWE-184: Incomplete List of Disallowed Inputs •

CVSS: 7.3EPSS: 1%CPEs: 2EXPL: 0

11 Jun 2024 — Microsoft Office Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Office • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30102 • CWE-416: Use After Free •

CVSS: 7.6EPSS: 3%CPEs: 8EXPL: 0

11 Jun 2024 — Microsoft Office Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Office • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30101 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2024 — Microsoft Office Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de Microsoft Office This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Office. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Office Performance Monitor executable. By creating a symbolic link, an attacker can abuse the process to delete a... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26199 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

13 Feb 2024 — Microsoft Office OneNote Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Office OneNote • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21384 • CWE-416: Use After Free •

CVSS: 9.0EPSS: 15%CPEs: 4EXPL: 1

13 Feb 2024 — Microsoft Outlook Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Outlook • https://github.com/d0rb/CVE-2024-21378 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 93%CPEs: 4EXPL: 22

13 Feb 2024 — Microsoft Outlook Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Outlook Microsoft Outlook contains an improper input validation vulnerability that allows for remote code execution. Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode. • https://github.com/DevAkabari/CVE-2024-21413 • CWE-20: Improper Input Validation •