Untrusted search path vulnerability in Microsoft OneDrive allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
7.8CVSS
7.6AI Score
0.323EPSS
Untrusted search path vulnerability in the installer of Microsoft OneDrive allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
7.8CVSS
7.6AI Score
0.323EPSS
A security feature bypass vulnerability exists in Microsoft OneDrive App for Android.This could allow an attacker to bypass the passcode or fingerprint requirements of the App.The security update addresses the vulnerability by correcting the way Microsoft OneDrive App for Android handles sharing li...
9.1CVSS
8.8AI Score
0.003EPSS
An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links, aka 'OneDrive for Windows Elevation of Privilege Vulnerability'.
5.5CVSS
6.9AI Score
0.0004EPSS
An elevation of privilege vulnerability exists in Microsoft OneDrive that allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft OneDrive Elevation of Privilege Vulnerability'.
7.8CVSS
8.1AI Score
0.0004EPSS
<p>An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status.</p><p>To exploit this vulnerability, an attacker ...
7.1CVSS
7.2AI Score
0.001EPSS
<p>An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status.</p><p>To exploit this vulnerability, an attacker ...
7.1CVSS
7.2AI Score
0.0004EPSS
<p>An elevation of privilege vulnerability exists when the OneDrive for Windows Desktop application improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file with an elevated status.</p><p>To exploit this vulnerability, an attacker ...
7.1CVSS
7.1AI Score
0.001EPSS
5.9CVSS
6.9AI Score
0.0004EPSS
5.5CVSS
6.9AI Score
0.001EPSS
6.5CVSS
7.5AI Score
0.001EPSS
5.5CVSS
6.9AI Score
0.001EPSS
7.8CVSS
8.6AI Score
0.0004EPSS