886 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 21EXPL: 0

Windows Task Scheduler Elevation of Privilege Vulnerability Microsoft Windows Task Scheduler contains a privilege escalation vulnerability that can allow an attacker-provided, local application to escalate privileges outside of its AppContainer, and access privileged RPC functions. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49039 • CWE-287: Improper Authentication •

CVSS: 6.2EPSS: 0%CPEs: 30EXPL: 0

Windows Package Library Manager Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38203 • CWE-693: Protection Mechanism Failure •

CVSS: 7.8EPSS: 0%CPEs: 30EXPL: 0

Windows Registry Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43641 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 23EXPL: 0

Win32k Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43636 • CWE-822: Untrusted Pointer Dereference •

CVSS: 8.8EPSS: 0%CPEs: 30EXPL: 0

Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43635 • CWE-190: Integer Overflow or Wraparound •