7.5CVSS
7.7AI Score
0.001EPSS
7.8CVSS
8.3AI Score
0.001EPSS
5.5CVSS
6.3AI Score
0.001EPSS
Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference...
7.8CVSS
7.8AI Score
0.001EPSS
7.8CVSS
7.9AI Score
0.001EPSS
7.2CVSS
7.4AI Score
0.001EPSS
4.3CVSS
4.3AI Score
0.001EPSS
8.3CVSS
8.2AI Score
0.003EPSS
6.5CVSS
6.3AI Score
0.001EPSS
8.3CVSS
8.1AI Score
0.001EPSS
3.3CVSS
4AI Score
0.001EPSS
7.6CVSS
7.9AI Score
0.0004EPSS
7.6CVSS
7.9AI Score
0.0004EPSS
7.6CVSS
7.9AI Score
0.0004EPSS
7.8CVSS
8.3AI Score
0.001EPSS
7.3CVSS
7.4AI Score
0.0005EPSS
5.3CVSS
5.3AI Score
0.004EPSS
6.5CVSS
6.8AI Score
0.0004EPSS
4.7CVSS
6.8AI Score
0.0005EPSS
7.8CVSS
7.8AI Score
0.001EPSS
8.6CVSS
9AI Score
0.001EPSS
5.4CVSS
5.4AI Score
0.0005EPSS
4.3CVSS
6.8AI Score
0.0005EPSS
8.8CVSS
6.7AI Score
0.0004EPSS
6.5CVSS
6.6AI Score
0.0005EPSS
7.8CVSS
7.7AI Score
0.065EPSS
5.4CVSS
5.8AI Score
0.001EPSS
4.8CVSS
4.7AI Score
0.0005EPSS
8.2CVSS
7.7AI Score
0.001EPSS
6.5CVSS
6.6AI Score
0.009EPSS
An authenticated attacker can exploit an Untrusted Search Path vulnerability in Microsoft Dataverse to execute code over a...
8CVSS
7.8AI Score
0.001EPSS
5.4CVSS
5.2AI Score
0.0005EPSS
8.1CVSS
8.1AI Score
0.001EPSS
4.4CVSS
4.7AI Score
0.0005EPSS
Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka "Silverlight...
7.8CVSS
7.8AI Score
0.001EPSS
Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow...
Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint 95 document, aka "PowerPoint Parsing Buffer Overflow...
7.8CVSS
7.9AI Score
0.001EPSS
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data;....
8.8CVSS
8.7AI Score
0.126EPSS
5.4CVSS
6AI Score
0.001EPSS
4.3CVSS
4.3AI Score
0.001EPSS
An elevation of privilege vulnerability exists when the Windows Telephony Server improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The...
7.8CVSS
7.8AI Score
0.0004EPSS
An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The...
7.8CVSS
7.8AI Score
0.0004EPSS
An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete.....
7.8CVSS
7.6AI Score
0.0004EPSS
An information disclosure vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system To exploit this vulnerability, an attacker would need to run a...
5.5CVSS
5.6AI Score
0.0004EPSS
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction......
9.8CVSS
9.6AI Score
0.119EPSS
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG....
7.5CVSS
7.7AI Score
0.05EPSS
An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The.....
7.8CVSS
7.8AI Score
0.002EPSS