CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Time-of-check time-of-use (toctou) race condition in Windows TCP/IP allows an authorized attacker to elevate privileges locally. |
Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
Use after free in Windows SMBv3 Client allows an authorized attacker to execute code over a network. |
Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. |
Adobe Experience Manager versions 6.5.23.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized read access. Scope is changed |
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally. |
Tenda G3 v3.0br_V15.11.0.17 was discovered to contain a stack overflow in the bindDhcpIndex parameter in the modifyDhcpRule function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasTech ShopLentor allows Stored XSS. This issue affects ShopLentor: from n/a through 3.2.0. |
Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. |
No cwe for this issue in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
Out-of-bounds read in Windows Internet Information Services allows an unauthorized attacker to deny service over a network. |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to disclose information locally. |
Free of memory not on the heap in Microsoft Office allows an unauthorized attacker to execute code locally. |
Heap-based buffer overflow in Microsoft Office Visio allows an unauthorized attacker to execute code locally. |
Protection mechanism failure in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. |
Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally. |