Vulnerability & Exploit Database

Displaying entries 21 - 30 of 135952 in total

CVE-2018-8474: Lync for Mac 2011 Security Feature Bypass Vulnerability [Office for Mac] Vulnerability

  • Severity: 4
  • Published: September 11, 2018

A security feature bypass vulnerability exists when Lync for Mac 2011 fails to properly sanitize specially crafted messages. An attacker who successfully exploited this vulnerability could cause a targeted Lync for Mac 2011 user's system to browse to an attacker-specified website or automatically download file types on the operati...

CVE-2018-8429: Microsoft Excel Information Disclosure Vulnerability [Office for Mac] Vulnerability

  • Severity: 4
  • Published: September 11, 2018

An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could access information previously deleted from the active worksheet. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to...

CVE-2018-8332: Win32k Graphics Remote Code Execution Vulnerability [Office for Mac] Vulnerability

  • Severity: 4
  • Published: September 11, 2018

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user r...

CVE-2018-8331: Microsoft Excel Remote Code Execution Vulnerability [Office for Mac] Vulnerability

  • Severity: 4
  • Published: September 11, 2018

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could ta...

Microsoft CVE-2018-8475: Windows Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: September 11, 2018

A remote code execution vulnerability exists when Windows does not properly handle specially crafted image files. An attacker who successfully exploited the vulnerability could execute arbitrary code. To exploit the vulnerability, an attacker would have to convince a user to download an image file. The update addresses the vulnerability ...

Microsoft CVE-2018-8470: Internet Explorer Security Feature Bypass Vulnerability Vulnerability

  • Severity: 4
  • Published: September 11, 2018

A security feature bypass vulnerability exists in Internet Explorer due to how scripts are handled that allows a universal cross-site scripting (UXSS) condition. An attacker could use the UXSS vulnerability to access any session belonging to web pages currently opened (or cached) by the browser at the time the attack is triggered. To exp...

Microsoft CVE-2018-8469: Microsoft Edge Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: September 11, 2018

An elevation of privilege vulnerability exists in Microsoft Edge that could allow an attacker to escape from the AppContainer sandbox in the browser. An attacker who successfully exploited this vulnerability could gain elevated privileges and break out of the Edge AppContainer sandbox. The vulnerability by itself does not allow arbitrary...

Microsoft CVE-2018-8468: Windows Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: September 11, 2018

An elevation of privilege vulnerability exists when Windows, allowing a sandbox escape. An attacker who successfully exploited the vulnerability could use the sandbox escape to elevate privileges on an affected system. This vulnerability by itself does not allow arbitrary code execution. However, the vulnerability could allow arbitrary c...

Microsoft CVE-2018-8467: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: September 11, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-8466: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: September 11, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...