Show filters
776 Total Results
Displaying 11-20 of 776
Sort by:
Attacker Value
High

CVE-2023-35636

Disclosure Date: December 12, 2023 (last updated January 12, 2025)
Microsoft Outlook Information Disclosure Vulnerability
Attacker Value
High

CVE-2023-33148

Disclosure Date: July 11, 2023 (last updated January 11, 2025)
Microsoft Office Elevation of Privilege Vulnerability
Attacker Value
High

CVE-2023-28285

Disclosure Date: April 11, 2023 (last updated January 11, 2025)
Microsoft Office Remote Code Execution Vulnerability
Attacker Value
High

CVE-2023-23398

Disclosure Date: March 14, 2023 (last updated May 29, 2024)
Microsoft Excel Spoofing Vulnerability
Attacker Value
Unknown

CVE-2022-29109

Disclosure Date: May 10, 2022 (last updated November 29, 2024)
Microsoft Excel Remote Code Execution Vulnerability
3
Attacker Value
Unknown

CVE-2021-36260

Disclosure Date: September 22, 2021 (last updated February 23, 2025)
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
Attacker Value
Unknown

CVE-2024-49033

Disclosure Date: November 12, 2024 (last updated November 16, 2024)
Microsoft Word Security Feature Bypass Vulnerability
Attacker Value
High

CVE-2023-28311

Disclosure Date: April 11, 2023 (last updated January 11, 2025)
Microsoft Word Remote Code Execution Vulnerability
Attacker Value
Very High

CVE-2021-3723

Disclosure Date: November 12, 2021 (last updated February 23, 2025)
A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session.
Attacker Value
Low

CVE-2020-0543 CROSSTALK

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.