Page 16 of 386 results (0.003 seconds)

CVSS: 6.2EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Package Library Manager Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38203 • CWE-693: Protection Mechanism Failure •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 1

12 Nov 2024 — Windows Registry Elevation of Privilege Vulnerability The Microsoft Windows kernel registry security descriptor refcount may overflow when referenced by too many transacted operations. • https://packetstorm.news/files/id/183018 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

12 Nov 2024 — Win32k Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43636 • CWE-822: Untrusted Pointer Dereference •

CVSS: 10.0EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43635 • CWE-190: Integer Overflow or Wraparound •

CVSS: 10.0EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43622 • CWE-122: Heap-based Buffer Overflow •

CVSS: 10.0EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43621 • CWE-122: Heap-based Buffer Overflow •

CVSS: 10.0EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43620 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49046 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.8EPSS: 0%CPEs: 24EXPL: 1

12 Nov 2024 — NTLM Hash Disclosure Spoofing Vulnerability Microsoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user. • https://github.com/RonF98/CVE-2024-43451-POC • CWE-73: External Control of File Name or Path •

CVSS: 7.2EPSS: 0%CPEs: 23EXPL: 0

12 Nov 2024 — Windows USB Video Class System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449 • CWE-125: Out-of-bounds Read •