Page 121 of 623 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 18EXPL: 0

Windows COM+ Event System Service Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en system service de eventos COM+ de Windows Microsoft Windows COM+ Event System Service contains an unspecified vulnerability that allows for privilege escalation. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41033 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 1

Windows Common Log File System Driver Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows Common Log File System Driver. Este ID de CVE es diferente de CVE-2022-35803 Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation. • https://github.com/fortra/CVE-2022-37969 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37969 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 17EXPL: 0

Windows Hyper-V Elevation of Privilege Vulnerability This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the vhdmp.sys driver. The issue results from improper authorization logic when accessing VHD files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35751 •

CVSS: 8.8EPSS: 0%CPEs: 27EXPL: 0

Win32k Elevation of Privilege Vulnerability This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of bitmap objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750 •

CVSS: 7.8EPSS: 42%CPEs: 19EXPL: 0

Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Microsoft Windows Support Diagnostic Tool (MSDT). Este ID de CVE es diferente de CVE-2022-35743 A remote code execution vulnerability exists when Microsoft Windows MSDT is called using the URL protocol from a calling application. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713 •