cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-33148,https://securityvulnerability.io/vulnerability/CVE-2023-33148,Microsoft Office Elevation of Privilege Vulnerability,"A vulnerability in Microsoft Office allows attackers to exploit certain conditions to elevate their privileges, potentially gaining unauthorized access to sensitive information and executing arbitrary commands. This flaw emphasizes the importance of keeping software updated and maintaining robust security measures to mitigate risks.",Microsoft,"Microsoft Office 2013 Click-to-run (c2r),Microsoft Office 2019,Microsoft 365 Apps For Enterprise,Microsoft Office Ltsc 2021",7.8,HIGH,0.0007800000021234155,false,,false,false,false,,,false,false,,2023-07-11T18:15:00.000Z,0 CVE-2022-22004,https://securityvulnerability.io/vulnerability/CVE-2022-22004,Microsoft Office ClickToRun Remote Code Execution Vulnerability,Microsoft Office ClickToRun Remote Code Execution Vulnerability,Microsoft,"Microsoft Office 2013 Click-to-run (c2r),Microsoft 365 Apps For Enterprise",7.8,HIGH,0.012609999626874924,false,,false,false,false,,,false,false,,2022-02-09T16:36:57.000Z,0 CVE-2020-16928,https://securityvulnerability.io/vulnerability/CVE-2020-16928,Microsoft Office Click-to-Run Elevation of Privilege Vulnerability,"

An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files. An attacker who successfully exploited the vulnerability could elevate privileges.

To exploit this vulnerability, an attacker would need to convince a user to open a specially crafted file.

The security update addresses the vulnerability by correcting how Microsoft Office Click-to-Run (C2R) components handle these files.

",Microsoft,"Microsoft Office 2013 Click-to-run (c2r),Microsoft Office 2019,Microsoft 365 Apps For Enterprise",7.8,HIGH,0.003060000017285347,false,,false,false,false,,,false,false,,2020-10-16T23:15:00.000Z,0 CVE-2020-16955,https://securityvulnerability.io/vulnerability/CVE-2020-16955,Microsoft Office Click-to-Run Elevation of Privilege Vulnerability,"

An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files. An attacker who successfully exploited the vulnerability could elevate privileges.

To exploit this vulnerability, an attacker would need to convince a user to open a specially crafted file.

The security update addresses the vulnerability by correcting how Microsoft Office Click-to-Run (C2R) components handle these files.

",Microsoft,"Microsoft Office 2013 Click-to-run (c2r),Microsoft Office 2019,Microsoft 365 Apps For Enterprise",7.8,HIGH,0.003060000017285347,false,,false,false,false,,,false,false,,2020-10-16T23:15:00.000Z,0 CVE-2020-16934,https://securityvulnerability.io/vulnerability/CVE-2020-16934,Microsoft Office Click-to-Run Elevation of Privilege Vulnerability,"

An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files. An attacker who successfully exploited the vulnerability could elevate privileges.

To exploit this vulnerability, an attacker would need to convince a user to open a specially crafted file.

The security update addresses the vulnerability by correcting how Microsoft Office Click-to-Run (C2R) components handle these files.

",Microsoft,"Microsoft Office 2013 Click-to-run (c2r),Microsoft Office 2019,Microsoft 365 Apps For Enterprise",7,HIGH,0.003060000017285347,false,,false,false,false,,,false,false,,2020-10-16T23:15:00.000Z,0 CVE-2020-1581,https://securityvulnerability.io/vulnerability/CVE-2020-1581,Microsoft Office Click-to-Run Elevation of Privilege Vulnerability,"An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) components handle objects in memory. An attacker who successfully exploited the vulnerability could elevate privileges. The attacker would need to already have the ability to execute code on the system. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The security update addresses the vulnerability by correcting how Microsoft Office Click-to-Run (C2R) components handle objects in memory. ",Microsoft,"Microsoft Office 2013 Click-to-run (c2r),Microsoft Office 2019,Microsoft 365 Apps For Enterprise",7.8,HIGH,0.0017900000093504786,false,,false,false,false,,,false,false,,2020-08-17T19:15:00.000Z,0