Page 17 of 453 results (0.008 seconds)

CVSS: 10.0EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43635 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

12 Nov 2024 — Windows DWM Core Library Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43629 • CWE-822: Untrusted Pointer Dereference •

CVSS: 9.0EPSS: 0%CPEs: 13EXPL: 0

12 Nov 2024 — Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43624 • CWE-822: Untrusted Pointer Dereference •

CVSS: 10.0EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43622 • CWE-122: Heap-based Buffer Overflow •

CVSS: 10.0EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43621 • CWE-122: Heap-based Buffer Overflow •

CVSS: 10.0EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Telephony Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43620 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 0

12 Nov 2024 — Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49046 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.6EPSS: 0%CPEs: 15EXPL: 1

12 Nov 2024 — Windows Registry Elevation of Privilege Vulnerability The Microsoft Windows kernel has double-fetch vulnerability in the loading of remote registry hives that can lead to memory corruption. • https://packetstorm.news/files/id/182938 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.8EPSS: 0%CPEs: 24EXPL: 0

12 Nov 2024 — NTLM Hash Disclosure Spoofing Vulnerability Microsoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43451 • CWE-73: External Control of File Name or Path •

CVSS: 7.2EPSS: 0%CPEs: 23EXPL: 0

12 Nov 2024 — Windows USB Video Class System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449 • CWE-125: Out-of-bounds Read •