Show filters
776 Total Results
Displaying 11-20 of 776
Sort by:
Attacker Value
High
CVE-2023-35636
Disclosure Date: December 12, 2023 (last updated January 12, 2025)
Microsoft Outlook Information Disclosure Vulnerability
2
Attacker Value
High
CVE-2023-33148
Disclosure Date: July 11, 2023 (last updated January 11, 2025)
Microsoft Office Elevation of Privilege Vulnerability
2
Attacker Value
High
CVE-2023-28285
Disclosure Date: April 11, 2023 (last updated January 11, 2025)
Microsoft Office Remote Code Execution Vulnerability
2
Attacker Value
High
CVE-2023-23398
Disclosure Date: March 14, 2023 (last updated May 29, 2024)
Microsoft Excel Spoofing Vulnerability
2
Attacker Value
Unknown
CVE-2022-29109
Disclosure Date: May 10, 2022 (last updated November 29, 2024)
Microsoft Excel Remote Code Execution Vulnerability
3
Attacker Value
Unknown
CVE-2021-36260
Disclosure Date: September 22, 2021 (last updated February 23, 2025)
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
3
Attacker Value
Unknown
CVE-2024-49033
Disclosure Date: November 12, 2024 (last updated November 16, 2024)
Microsoft Word Security Feature Bypass Vulnerability
2
Attacker Value
High
CVE-2023-28311
Disclosure Date: April 11, 2023 (last updated January 11, 2025)
Microsoft Word Remote Code Execution Vulnerability
1
Attacker Value
Very High
CVE-2021-3723
Disclosure Date: November 12, 2021 (last updated February 23, 2025)
A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session.
1
Attacker Value
Low
CVE-2020-0543 CROSSTALK
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
1