Show filters
30 Total Results
Displaying 11-20 of 30
Sort by:
Attacker Value
Unknown

CVE-2024-6286

Disclosure Date: July 10, 2024 (last updated July 11, 2024)
Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Workspace app for Windows
0
Attacker Value
Unknown

CVE-2024-5404

Disclosure Date: June 03, 2024 (last updated January 05, 2025)
An unauthenticated remote attacker can change the admin password in a moneo appliance due to weak password recovery mechanism.
0
Attacker Value
Unknown

CVE-2024-27244

Disclosure Date: May 15, 2024 (last updated May 16, 2024)
Insufficient verification of data authenticity in the installer for Zoom Workplace VDI App for Windows may allow an authenticated user to conduct an escalation of privilege via local access.
0
Attacker Value
Unknown

CVE-2024-22167

Disclosure Date: March 13, 2024 (last updated June 25, 2024)
A potential DLL hijacking vulnerability in the SanDisk PrivateAccess application for Windows that could lead to arbitrary code execution in the context of the system user. This vulnerability is only exploitable locally if an attacker has access to a copy of the user's vault or has already gained access into a user's system. This attack is limited to the system in context and cannot be propagated.
0
Attacker Value
Unknown

CVE-2023-29335

Disclosure Date: May 09, 2023 (last updated January 11, 2025)
Microsoft Word Security Feature Bypass Vulnerability
Attacker Value
Unknown

CVE-2022-26934

Disclosure Date: May 10, 2022 (last updated January 02, 2025)
Windows Graphics Component Information Disclosure Vulnerability
Attacker Value
Unknown

CVE-2021-40454

Disclosure Date: October 13, 2021 (last updated February 23, 2025)
Rich Text Edit Control Information Disclosure Vulnerability
0
Attacker Value
Unknown

CVE-2021-28455

Disclosure Date: May 11, 2021 (last updated November 28, 2024)
Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability
0
Attacker Value
Unknown

CVE-2020-16933

Disclosure Date: October 16, 2020 (last updated November 28, 2024)
<p>A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user.</p> <p>To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit th…
0
Attacker Value
Unknown

CVE-2020-16949

Disclosure Date: October 16, 2020 (last updated February 22, 2025)
<p>A denial of service vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could cause a remote denial of service against a system.</p> <p>Exploitation of the vulnerability requires that a specially crafted email be sent to a vulnerable Outlook server.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Outlook handles objects in memory.</p>
0