cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-38250,https://securityvulnerability.io/vulnerability/CVE-2024-38250,Windows Graphics Component Elevation of Privilege Vulnerability,"The Windows Graphics Component is subject to an elevation of privilege vulnerability, which could allow an attacker to execute arbitrary code with elevated privileges. Successfully exploiting this vulnerability requires that an attacker log onto the target system and run a specially crafted application. This vulnerability poses significant risks by enabling unauthorized access to sensitive system resources and functions, potentially leading to greater attacks on the affected Windows operating environments. It is crucial for users and organizations to remain vigilant and apply recommended patches to mitigate potential exploitation.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Microsoft Office Ltsc For Mac 2021,Microsoft Office For Android,Microsoft Office For Universal",7.8,HIGH,0.0004799999878741801,false,false,false,false,,false,false,2024-09-10T16:53:47.033Z,0 CVE-2023-36565,https://securityvulnerability.io/vulnerability/CVE-2023-36565,Microsoft Office Graphics Elevation of Privilege Vulnerability,Microsoft Office Graphics Elevation of Privilege Vulnerability,Microsoft,"Microsoft Office 2019 For Mac,Microsoft Office Ltsc For Mac 2021,Microsoft Office For Android,Microsoft Office For Universal",7,HIGH,0.000539999979082495,false,false,false,false,,false,false,2023-10-10T18:15:00.000Z,0 CVE-2023-24910,https://securityvulnerability.io/vulnerability/CVE-2023-24910,Windows Graphics Component Elevation of Privilege Vulnerability,Windows Graphics Component Elevation of Privilege Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Microsoft Office 2019 For Mac,Microsoft Office Ltsc For Mac 2021,Microsoft Office For Android,Microsoft Office For Universal",7.8,HIGH,0.0024800000246614218,false,false,false,false,,false,false,2023-03-14T17:15:00.000Z,0 CVE-2023-23391,https://securityvulnerability.io/vulnerability/CVE-2023-23391,Office for Android Spoofing Vulnerability,Office for Android Spoofing Vulnerability,Microsoft,Microsoft Office For Android,5.5,MEDIUM,0.07620000094175339,false,false,false,false,,false,false,2023-03-14T17:15:00.000Z,0 CVE-2023-21823,https://securityvulnerability.io/vulnerability/CVE-2023-21823,Windows Graphics Component Remote Code Execution Vulnerability,Windows Graphics Component Remote Code Execution Vulnerability,Microsoft,"Microsoft Office For Android,Microsoft Office For Universal,Microsoft Office For iOS,Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 20h2,Windows 11 Version 21h2,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.5501499772071838,true,false,false,true,true,false,false,2023-02-14T21:15:00.000Z,0 CVE-2019-1084,https://securityvulnerability.io/vulnerability/CVE-2019-1084,,"An information disclosure vulnerability exists when Exchange allows creation of entities with Display Names having non-printable characters. An authenticated attacker could exploit this vulnerability by creating entities with invalid display names, which, when added to conversations, remain invisible. This security update addresses the issue by validating display names upon creation in Microsoft Exchange, and by rendering invalid display names correctly in Microsoft Outlook clients., aka 'Microsoft Exchange Information Disclosure Vulnerability'.",Microsoft,"Microsoft Exchange Server,Microsoft Outlook,Microsoft Office,Microsoft Lync,Microsoft Lync Basic,Microsoft Outlook For Android,Skype For Business,Skype For Business Basic,Office 365 Proplus,Microsoft Exchange Server 2016,Microsoft Exchange Server 2019,Microsoft Exchange Server 2013,Mail And Calendar,Outlook For iOS",6.5,MEDIUM,0.0025100000202655792,false,false,false,false,,false,false,2019-07-15T18:56:21.000Z,0