Page 28 of 1035 results (0.003 seconds)

CVSS: 7.8EPSS: 9%CPEs: 4EXPL: 0

Microsoft Excel Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Microsoft Excel. Este ID de CVE es diferente de CVE-2022-26901 • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24473 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

Microsoft Office Word Tampering Vulnerability Una vulnerabilidad de Manipulación de Microsoft Office Word • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24511 •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

Microsoft Word Security Feature Bypass Vulnerability Una vulnerabilidad de Omisión de Funcionalidades de Seguridad de Microsoft Word • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24462 •

CVSS: 7.8EPSS: 38%CPEs: 3EXPL: 0

Microsoft Office Visio Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Microsoft Office Visio. Este ID de CVE es diferente de CVE-2022-24509, CVE-2022-24510 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of EMR_COMMENT_EMFPLUS records in EMF images. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24461 •

CVSS: 7.8EPSS: 38%CPEs: 3EXPL: 0

Microsoft Office Visio Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Microsoft Office Visio. Este ID de CVE es diferente de CVE-2022-24461, CVE-2022-24510 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Visio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of EMR_COMMENT_EMFPLUS records in EMF images. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24509 •