Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Total 21940 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-24468 1 Microsoft 1 Azure Site Recovery 2024-11-21 6.5 MEDIUM 7.2 HIGH
Azure Site Recovery Remote Code Execution Vulnerability
CVE-2022-24467 1 Microsoft 1 Azure Site Recovery 2024-11-21 6.5 MEDIUM 7.2 HIGH
Azure Site Recovery Remote Code Execution Vulnerability
CVE-2022-24465 1 Microsoft 1 Intune Company Portal 2024-11-21 2.1 LOW 3.3 LOW
Microsoft Intune Portal for iOS Security Feature Bypass Vulnerability
CVE-2022-24464 2 Fedoraproject, Microsoft 5 Fedora, .net, .net Core and 2 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
.NET and Visual Studio Denial of Service Vulnerability
CVE-2022-24463 1 Microsoft 1 Exchange Server 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Microsoft Exchange Server Spoofing Vulnerability
CVE-2022-24462 1 Microsoft 2 365 Apps, Office 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Microsoft Word Security Feature Bypass Vulnerability
CVE-2022-24461 1 Microsoft 2 365 Apps, Office 2024-11-21 6.8 MEDIUM 7.8 HIGH
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2022-24460 1 Microsoft 5 Windows 10, Windows 11, Windows Server and 2 more 2024-11-21 7.6 HIGH 7.0 HIGH
Tablet Windows User Interface Application Elevation of Privilege Vulnerability
CVE-2022-24459 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows Fax and Scan Service Elevation of Privilege Vulnerability
CVE-2022-24457 1 Microsoft 1 Heif Image Extension 2024-11-21 6.8 MEDIUM 7.8 HIGH
HEIF Image Extensions Remote Code Execution Vulnerability
CVE-2022-24456 1 Microsoft 1 Hevc Video Extensions 2024-11-21 6.8 MEDIUM 7.8 HIGH
HEVC Video Extensions Remote Code Execution Vulnerability
CVE-2022-24455 1 Microsoft 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows CD-ROM Driver Elevation of Privilege Vulnerability
CVE-2022-24454 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows Security Support Provider Interface Elevation of Privilege Vulnerability
CVE-2022-24453 1 Microsoft 1 Hevc Video Extensions 2024-11-21 6.8 MEDIUM 7.8 HIGH
HEVC Video Extensions Remote Code Execution Vulnerability
CVE-2022-24452 1 Microsoft 1 Hevc Video Extensions 2024-11-21 6.8 MEDIUM 7.8 HIGH
HEVC Video Extensions Remote Code Execution Vulnerability
CVE-2022-24451 1 Microsoft 1 Vp9 Video Extensions 2024-11-21 6.8 MEDIUM 7.8 HIGH
VP9 Video Extensions Remote Code Execution Vulnerability
CVE-2022-24369 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2024-11-21 6.8 MEDIUM 8.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 images. Crafted data in a JP2 image can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16087.
CVE-2022-24368 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16115.
CVE-2022-24367 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2024-11-21 6.8 MEDIUM 8.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15877.
CVE-2022-24366 2 Foxit, Microsoft 3 Pdf Editor, Pdf Reader, Windows 2024-11-21 6.8 MEDIUM 8.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15853.