Page 117 of 3007 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 62EXPL: 0

.NET Framework Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de .NET Framework • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26929 •

CVSS: 6.5EPSS: 1%CPEs: 32EXPL: 0

Windows Graphics Component Information Disclosure Vulnerability Una vulnerabilidad de Divulgación de Información de Windows Graphics Component. Este ID de CVE es diferente de CVE-2022-34728, CVE-2022-38006 • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35837 •

CVSS: 7.8EPSS: 0%CPEs: 32EXPL: 0

Windows Kernel Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows Kernel. Este ID de CVE es diferente de CVE-2022-37957, CVE-2022-37964 The Windows Kernel suffers from integer overflow vulnerabilities in its registry subkey lists leading to memory corruption. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37956 •

CVSS: 8.8EPSS: 0%CPEs: 17EXPL: 0

Windows Hyper-V Elevation of Privilege Vulnerability This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the vhdmp.sys driver. The issue results from improper authorization logic when accessing VHD files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35751 •

CVSS: 8.8EPSS: 0%CPEs: 27EXPL: 0

Win32k Elevation of Privilege Vulnerability This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of bitmap objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750 •