Show filters
1,840 Total Results
Displaying 211-220 of 1,840
Sort by:
Attacker Value
Unknown
CVE-2024-21384
Disclosure Date: February 13, 2024 (last updated February 26, 2025)
Microsoft Office OneNote Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2024-21379
Disclosure Date: February 13, 2024 (last updated February 26, 2025)
Microsoft Word Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2024-21378
Disclosure Date: February 13, 2024 (last updated February 26, 2025)
Microsoft Outlook Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2024-20673
Disclosure Date: February 13, 2024 (last updated February 26, 2025)
Microsoft Office Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2024-1252
Disclosure Date: February 06, 2024 (last updated February 26, 2025)
A vulnerability classified as critical was found in Tongda OA 2017 up to 11.9. Affected by this vulnerability is an unknown functionality of the file /general/attendance/manage/ask_duty/delete.php. The manipulation of the argument ASK_DUTY_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-252991.
0
Attacker Value
Unknown
CVE-2024-1251
Disclosure Date: February 06, 2024 (last updated February 26, 2025)
A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.10. Affected is an unknown function of the file /general/email/outbox/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-252990 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2024-23941
Disclosure Date: February 01, 2024 (last updated February 26, 2025)
Cross-site scripting vulnerability exists in Group Office prior to v6.6.182, prior to v6.7.64 and prior to v6.8.31, which may allow a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
0
Attacker Value
Unknown
CVE-2024-1012
Disclosure Date: January 31, 2024 (last updated February 26, 2025)
A vulnerability, which was classified as critical, has been found in Wanhu ezOFFICE 11.1.0. This issue affects some unknown processing of the file defaultroot/platform/bpm/work_flow/operate/wf_printnum.jsp. The manipulation of the argument recordId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252281 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2024-0938
Disclosure Date: January 26, 2024 (last updated February 26, 2025)
A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file /general/email/inbox/delete_webmail.php. The manipulation of the argument WEBBODY_ID_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-252183. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2024-22418
Disclosure Date: January 18, 2024 (last updated February 26, 2025)
Group-Office is an enterprise CRM and groupware tool. Affected versions are subject to a vulnerability which is present in the file upload mechanism of Group Office. It allows an attacker to execute arbitrary JavaScript code by embedding it within a file's name. For instance, using a filename such as “><img src=x onerror=prompt('XSS')>.jpg” triggers the vulnerability. When this file is uploaded, the JavaScript code within the filename is executed. This issue has been addressed in version 6.8.29. All users are advised to upgrade. There are no known workarounds for this vulnerability.
0