CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability. |
Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker to arbitrarily browse to a malicious website via a crafted HTML page. |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
Microsoft Exchange Server Remote Code Execution Vulnerability |
Windows Print Spooler Elevation of Privilege Vulnerability |
Windows Print Spooler Elevation of Privilege Vulnerability |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
Windows Mark of the Web Security Feature Bypass Vulnerability |
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability |
Windows Scripting Languages Remote Code Execution Vulnerability |
mDNSResponder.exe is vulnerable to DLL Sideloading attack. Executable improperly specifies how to load the DLL, from which folder and under what conditions. In these scenarios, a malicious attacker could be using the valid and legitimate executable to load malicious files. |
Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
Windows SmartScreen Security Feature Bypass Vulnerability |
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability |
Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Microsoft Publisher Security Feature Bypass Vulnerability |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Windows Graphics Component Remote Code Execution Vulnerability |
IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker to execute arbitrary code on the system, caused by a YAML deserialization flaw. By sending a specially crafted obsolete API call, an attacker could exploit this vulnerability to execute arbitrary code on the system. The obsolete API call was removed in Faspex 4.4.2 PL2. IBM X-Force ID: 243512. |
Microsoft Outlook Elevation of Privilege Vulnerability |