Page 10 of 55 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

Windows Active Directory Domain Services API Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21816 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

Windows Secure Channel Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21813 • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

Windows Common Log File System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21812 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

Windows iSCSI Service Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21811 • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

Windows MSHTML Platform Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of certain image file types that can contain script tags. Under limited circumstances, crafted data in an image can lead to execution of untrusted script. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21805 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •