| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Internet Connection Sharing (ICS) Remote Code Execution Vulnerability |
| Windows TCP/IP Denial of Service Vulnerability |
| Windows Kernel Elevation of Privilege Vulnerability |
| DHCP Server Service Information Disclosure Vulnerability |
| Windows GDI Elevation of Privilege Vulnerability |
| DHCP Server Service Denial of Service Vulnerability |
| Azure DevOps Server Remote Code Execution Vulnerability |
| Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
| Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability |
| Windows MSHTML Platform Spoofing Vulnerability |
| Windows Graphics Component Elevation of Privilege Vulnerability |
| Microsoft Management Console Remote Code Execution Vulnerability |
| Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication. |
| Potential privilege escalation issue in Revenera InstallShield version 2023 R1 running a renamed Setup.exe on Windows. When a local administrator executes a renamed Setup.exe, the MPR.dll may get loaded from an insecure location and can result in a privilege escalation. The issue has been fixed in versions 2023 R2 and later. |
| The installer of WTW EAGLE (for Windows) 3.0.8.0 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with the privileges of the running application. |
| Improper Input Validation vulnerability in Salesforce Tableau Server on Windows, Linux (tabdoc api - create-data-source-from-file-upload modules) allows Absolute Path Traversal.This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19. |
| Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (EPS Server modules) allows Resource Location Spoofing. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19. |
| Windows Kernel Elevation of Privilege Vulnerability |
| Windows MSHTML Platform Remote Code Execution Vulnerability |
| Microsoft Exchange Server Information Disclosure Vulnerability |