CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Ai command injection in Agentic AI and Visual Studio Code allows an unauthorized attacker to execute code over a network. |
Improper link resolution before file access ('link following') in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally. |
External control of file name or path in Azure Arc allows an authorized attacker to elevate privileges locally. |
Improper link resolution before file access ('link following') in Xbox allows an authorized attacker to elevate privileges locally. |
Time-of-check time-of-use (toctou) race condition in Graphics Kernel allows an authorized attacker to execute code locally. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally. |
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. |
Heap-based buffer overflow in Microsoft Office Visio allows an unauthorized attacker to execute code locally. |
Free of memory not on the heap in Microsoft Office allows an unauthorized attacker to execute code locally. |
Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to disclose information locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Free of memory not on the heap in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for Intel Gemini Lake.This issue affects:
SecureCore™ for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567. |
Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore™ Technology™ 4 potentially allows denial-of-service attacks or arbitrary code execution. |
Improper Access Control in SMI handler vulnerability in Phoenix SecureCore™ Technology™ 4 allows SPI flash modification.
This issue affects SecureCore™ Technology™ 4:
* from 4.3.0.0 before 4.3.0.203
*
from
4.3.1.0 before 4.3.1.163
*
from
4.4.0.0 before 4.4.0.217
*
from
4.5.0.0 before 4.5.0.138 |