| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| <p>A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into opening a malicious 'package.json' file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>To exploit this vulnerability, an attacker would need to convince a target to clone a repository and open it in Visual Studio Code. Attacker-specified code would execute when the target opens the malicious 'package.json' file.</p>
<p>The update address the vulnerability by modifying the way Visual Studio Code handles JSON files.</p>
|
| <p>A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code.</p>
<p>Exploitation of the vulnerability requires that a program process a specially crafted image file.</p>
<p>The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.</p>
|
| Microsoft Word Security Feature Bypass Vulnerability |
| Microsoft SharePoint Information Disclosure Vulnerability |
| Microsoft SharePoint Server Spoofing Vulnerability |
| Microsoft SharePoint Server Spoofing Vulnerability |
| Windows Print Spooler Elevation of Privilege Vulnerability |
| Win32k Information Disclosure Vulnerability |
| Windows Bind Filter Driver Elevation of Privilege Vulnerability |
| Windows Port Class Library Elevation of Privilege Vulnerability |
| Windows Error Reporting Elevation of Privilege Vulnerability |
| Windows Graphics Component Information Disclosure Vulnerability |
| <p>A remote code execution vulnerability exists when the Base3D rendering engine improperly handles memory.</p>
<p>An attacker who successfully exploited the vulnerability would gain execution on a victim system.</p>
<p>The security update addresses the vulnerability by correcting how the Base3D rendering engine handles memory.</p>
|
| Windows Print Spooler Elevation of Privilege Vulnerability |
| Remote Desktop Protocol Client Information Disclosure Vulnerability |
| Windows WalletService Information Disclosure Vulnerability |
| DirectX Elevation of Privilege Vulnerability |
| Remote Desktop Protocol Server Information Disclosure Vulnerability |
| <p>An elevation of privilege vulnerability exists in Network Watcher Agent virtual machine extension for Linux. An attacker who successfully exploited this vulnerability could execute code with elevated privileges.</p>
<p>To exploit this vulnerability, an attacker would have to be present as a user on the affected virtual machine.</p>
<p>The security update addresses this vulnerability by correcting how Network Watcher Agent virtual machine extension for Linux executes with elevated privileges.</p>
|
| Azure Sphere Unsigned Code Execution Vulnerability |