Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Microsoft Subscribe
Total 17397 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-38048 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2022-10-12 N/A 7.8 HIGH
Microsoft Office Remote Code Execution Vulnerability.
CVE-2022-37976 1 Microsoft 5 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 2 more 2022-10-12 N/A 8.8 HIGH
Active Directory Certificate Services Elevation of Privilege Vulnerability.
CVE-2022-36063 1 Microsoft 1 Azure Rtos Usbx 2022-10-12 N/A 9.8 CRITICAL
Azure RTOS USBx is a USB host, device, and on-the-go (OTG) embedded stack, fully integrated with Azure RTOS ThreadX and available for all Azure RTOS ThreadX–supported processors. Azure RTOS USBX implementation of host support for USB CDC ECM includes an integer underflow and a buffer overflow in the `_ux_host_class_cdc_ecm_mac_address_get` function which may be potentially exploited to achieve remote code execution or denial of service. Setting mac address string descriptor length to a `0` or `1` allows an attacker to introduce an integer underflow followed (string_length) by a buffer overflow of the `cdc_ecm -> ux_host_class_cdc_ecm_node_id` array. This may allow one to redirect the code execution flow or introduce a denial of service. The fix has been included in USBX release [6.1.12](https://github.com/azure-rtos/usbx/releases/tag/v6.1.12_rel). Improved mac address string descriptor length validation to check for unexpectedly small values may be used as a workaround.
CVE-2019-6763 2 Foxitsoftware, Microsoft 3 Foxit Reader, Phantompdf, Windows 2022-10-12 6.8 MEDIUM 7.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ToggleFormsDesign method of the Foxit.FoxitReader.Ctl ActiveX object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7874.
CVE-2019-6762 2 Foxitsoftware, Microsoft 3 Foxit Reader, Phantompdf, Windows 2022-10-12 6.8 MEDIUM 7.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of HTML files to PDF. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7844.
CVE-2019-6761 2 Foxitsoftware, Microsoft 3 Foxit Reader, Phantompdf, Windows 2022-10-12 6.8 MEDIUM 7.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.0.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA CXFA_FFDocView object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7777.
CVE-2022-37986 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-10-12 N/A 7.8 HIGH
Windows Win32k Elevation of Privilege Vulnerability.
CVE-2019-6760 2 Foxitsoftware, Microsoft 3 Foxit Reader, Phantompdf, Windows 2022-10-12 6.8 MEDIUM 7.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7694.
CVE-2019-6759 2 Foxitsoftware, Microsoft 3 Foxit Reader, Phantompdf, Windows 2022-10-12 6.8 MEDIUM 7.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7614.
CVE-2022-37985 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-10-12 N/A 5.5 MEDIUM
Windows Graphics Component Information Disclosure Vulnerability.
CVE-2022-37984 1 Microsoft 8 Windows 10, Windows 11, Windows 8.1 and 5 more 2022-10-12 N/A 7.8 HIGH
Windows WLAN Service Elevation of Privilege Vulnerability.
CVE-2019-6746 2 Foxitsoftware, Microsoft 2 Foxit Studio Photo, Windows 2022-10-12 4.3 MEDIUM 5.5 MEDIUM
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of TIF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7634.
CVE-2022-37983 1 Microsoft 4 Windows 10, Windows 11, Windows Server 2019 and 1 more 2022-10-12 N/A 7.8 HIGH
Microsoft DWM Core Library Elevation of Privilege Vulnerability.
CVE-2019-6758 2 Foxitsoftware, Microsoft 3 Foxit Reader, Phantompdf, Windows 2022-10-12 4.3 MEDIUM 5.5 MEDIUM
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7701.
CVE-2022-38016 1 Microsoft 4 Windows 10, Windows 11, Windows Server 2019 and 1 more 2022-10-12 N/A 8.8 HIGH
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability.
CVE-2022-38003 1 Microsoft 5 Windows 10, Windows 11, Windows Server 2016 and 2 more 2022-10-12 N/A 7.8 HIGH
Windows Resilient File System Elevation of Privilege.
CVE-2022-38001 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2022-10-12 N/A 6.5 MEDIUM
Microsoft Office Spoofing Vulnerability.
CVE-2019-6757 2 Foxitsoftware, Microsoft 3 Foxit Reader, Phantompdf, Windows 2022-10-12 6.8 MEDIUM 7.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7696.
CVE-2019-6756 2 Foxitsoftware, Microsoft 3 Foxit Reader, Phantompdf, Windows 2022-10-12 4.3 MEDIUM 5.5 MEDIUM
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit PhantomPDF 9.4.0.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of HTML files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7769.
CVE-2022-38033 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-10-12 N/A 6.5 MEDIUM
Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability.