7.8CVSS
8AI Score
0.0004EPSS
7.2CVSS
7.2AI Score
0.01EPSS
4.9CVSS
5.1AI Score
0.009EPSS
8.3CVSS
8AI Score
0.004EPSS
7.8CVSS
8.2AI Score
0.001EPSS
8.1CVSS
8.4AI Score
0.005EPSS
7.8CVSS
7.5AI Score
0.001EPSS
7.5CVSS
7.5AI Score
0.002EPSS
7.8CVSS
7.7AI Score
0.001EPSS
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. To exploit the vulnerability, an attacker could host....
7.5CVSS
8.5AI Score
0.012EPSS
7.8CVSS
7.9AI Score
0.0004EPSS
7.8CVSS
7.2AI Score
0.0004EPSS
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data;....
8.8CVSS
8.7AI Score
0.182EPSS
7.5CVSS
7.3AI Score
0.001EPSS
8.3CVSS
8AI Score
0.004EPSS
8.3CVSS
8AI Score
0.004EPSS
4.3CVSS
4.6AI Score
0.001EPSS
7.8CVSS
7.9AI Score
0.0004EPSS
7.5CVSS
7.7AI Score
0.001EPSS
8.8CVSS
9.2AI Score
0.019EPSS
7.4CVSS
7.9AI Score
0.001EPSS
8.2CVSS
8.4AI Score
0.001EPSS
4.7CVSS
4.6AI Score
0.001EPSS
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to...
7.8CVSS
7.7AI Score
0.014EPSS
An elevation of privilege vulnerability exists in the way that the rpcss.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially...
7CVSS
7.5AI Score
0.0004EPSS
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to...
7.8CVSS
7.7AI Score
0.014EPSS
5.5CVSS
5.9AI Score
0.001EPSS
7.8CVSS
7.9AI Score
0.001EPSS
7.8CVSS
7.4AI Score
0.0004EPSS
7CVSS
7.2AI Score
0.0004EPSS
7.1CVSS
8.8AI Score
0.001EPSS
7.8CVSS
8AI Score
0.001EPSS
6.5CVSS
6.8AI Score
0.002EPSS
6.4CVSS
6.2AI Score
0.0004EPSS
5.5CVSS
6.1AI Score
0.0004EPSS
8.8CVSS
8.9AI Score
0.028EPSS
6.5CVSS
6.8AI Score
0.002EPSS
7.8CVSS
7.4AI Score
0.0005EPSS
7.5CVSS
8.3AI Score
0.001EPSS
7.8CVSS
8.2AI Score
0.001EPSS
6.8CVSS
6.9AI Score
0.001EPSS
8.1CVSS
8.9AI Score
0.005EPSS
7.3CVSS
7.3AI Score
0.0004EPSS
7CVSS
7.2AI Score
0.0004EPSS
7.5CVSS
7.3AI Score
0.001EPSS