Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
3D Builder Remote Code Execution Vulnerability
3D Builder Remote Code Execution Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability
Heap-based buffer overflow in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.
Print 3D Remote Code Execution Vulnerability
Microsoft SQL Server Remote Code Execution Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
3D Builder Remote Code Execution Vulnerability
3D Builder Remote Code Execution Vulnerability
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
3D Builder Remote Code Execution Vulnerability
Microsoft SQL Server Remote Code Execution Vulnerability
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
3D Builder Remote Code Execution Vulnerability
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Microsoft Office Visio Remote Code Execution Vulnerability
Windows Fax Service Remote Code Execution Vulnerability
Windows Boot Manager Security Feature Bypass Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Adobe Acrobat Reader versions 22.003.20282 (and earlier), 22.003.20281 (and earlier) and 20.005.30418 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Windows Media Remote Code Execution Vulnerability
Microsoft Office Visio Remote Code Execution Vulnerability
Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Windows Graphics Component Elevation of Privilege Vulnerability
3D Builder Remote Code Execution Vulnerability
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
3D Builder Remote Code Execution Vulnerability
3D Builder Remote Code Execution Vulnerability
3D Builder Remote Code Execution Vulnerability
3D Builder Remote Code Execution Vulnerability
Heap-based buffer overflow in Windows DWM allows an authorized attacker to elevate privileges locally.
Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network.
.NET and Visual Studio Remote Code Execution Vulnerability
Adobe Framemaker versions 2020.5, 2022.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability
Win32k Elevation of Privilege Vulnerability
Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.
Winlogon Elevation of Privilege Vulnerability
Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability