Page 161 of 1001 results (0.005 seconds)

CVSS: 9.8EPSS: 1%CPEs: 15EXPL: 0

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28250 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 6.8EPSS: 0%CPEs: 13EXPL: 0

Windows Boot Manager Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28249 • CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

Windows Kernel Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28272 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 5.5EPSS: 0%CPEs: 15EXPL: 0

Windows Kernel Memory Information Disclosure Vulnerability The Windows Kernel suffers from a disclosure of kernel pointers and uninitialized memory through registry KTM transaction log files. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28271 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

Windows Kernel Elevation of Privilege Vulnerability In Windows Registry, security descriptors are shared by multiple keys, and thus reference counted via the _CM_KEY_SECURITY.ReferenceCount field. It is critical for system security that the kernel correctly keeps track of the references, so that the sum of the ReferenceCount fields is equal to the number of keys in the hive at all times (with small exceptions for things like transacted and not yet committed operations etc.). If the ReferenceCount of any descriptor drops below the true number of its active references, it may result in a use-after-free condition and memory corruption. Similarly, if the field becomes inadequately large, it may be possible to overflow it and also trigger a use-after-free. A bug of the latter type is described in this report. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28248 • CWE-190: Integer Overflow or Wraparound •