Page 2 of 258 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Microsoft Office OneNote Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Office OneNote • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21384 • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 1

Microsoft Outlook Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Outlook • https://github.com/d0rb/CVE-2024-21378 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21378 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

Microsoft Office Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Office • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20673 • CWE-693: Protection Mechanism Failure •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 17

Microsoft Outlook Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Outlook • https://github.com/DevAkabari/CVE-2024-21413 https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit https://github.com/DerZiad/CVE-2024-21413 https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability https://github.com/duy-31/CVE-2024-21413 https://github.com/CMNatic/CVE-2024-21413 https://github.com/r00tb1t/CVE-2024-21413-POC https://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability https:& • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Microsoft Word Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Word This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21379 • CWE-190: Integer Overflow or Wraparound •