Page 4 of 1027 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 1

Microsoft Outlook Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Outlook • https://github.com/d0rb/CVE-2024-21378 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21378 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

Microsoft Office Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Office • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20673 • CWE-693: Protection Mechanism Failure •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 17

Microsoft Outlook Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Outlook • https://github.com/DevAkabari/CVE-2024-21413 https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit https://github.com/DerZiad/CVE-2024-21413 https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability https://github.com/duy-31/CVE-2024-21413 https://github.com/CMNatic/CVE-2024-21413 https://github.com/r00tb1t/CVE-2024-21413-POC https://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability https:& • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Microsoft Word Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Word This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21379 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

A security vulnerability exists in FBX that could lead to remote code execution. To mitigate this vulnerability, the ability to insert FBX files has been disabled in Word, Excel, PowerPoint and Outlook for Windows and Mac. Versions of Office that had this feature enabled will no longer have access to it. This includes Office 2019, Office 2021, Office LTSC for Mac 2021, and Microsoft 365. As of February 13, 2024, the ability to insert FBX files has also been disabled in 3D Viewer. 3D models in Office documents that were previously inserted from a FBX file will continue to work as expected unless the Link to File option was chosen at insert time. This change is effective as of the January 9, 2024 security update. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20677 • CWE-122: Heap-based Buffer Overflow •