Page 2 of 37 results (0.005 seconds)

CVSS: 10.0EPSS: 2%CPEs: 16EXPL: 0

13 Jun 2023 — Remote Desktop Client Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29362 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.8EPSS: 1%CPEs: 10EXPL: 0

13 Jun 2023 — Windows Remote Desktop Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29352 •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

09 May 2023 — Microsoft Remote Desktop app for Windows Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28290 •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

25 Apr 2023 — Improper access control in the Web Login listener in Devolutions Remote Desktop Manager 2023.1.22 and earlier on Windows allows an authenticated user to bypass administrator-enforced Web Login restrictions and gain access to entries via an unexpected vector. • https://devolutions.net/security/advisories/DEVO-2023-0012 •

CVSS: 7.8EPSS: 3%CPEs: 15EXPL: 0

11 Apr 2023 — Remote Desktop Protocol Client Information Disclosure Vulnerability This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must open a remote desktop session to a host that has been compromised or otherwise under control of an attacker. The specific flaw exists within the Remote Desktop client. A crafted audio packet can trigger access to memory prior to initial... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28267 • CWE-126: Buffer Over-read •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 2

06 Mar 2023 — A vulnerability was found in FabulaTech Webcam for Remote Desktop 2.8.42. It has been classified as problematic. Affected is the function 0x222018 in the library ftwebcam.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. • https://drive.google.com/file/d/1_gVQtfbpywhh8Z6g4Y03Qg7UT3Aobz2e/view?usp=sharing • CWE-404: Improper Resource Shutdown or Release •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

06 Mar 2023 — A vulnerability was found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This issue affects some unknown processing in the library ftwebcam.sys of the component Global Variable Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. • https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1187 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

06 Mar 2023 — A vulnerability has been found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This vulnerability affects the function 0x222010/0x222018 in the library ftwebcam.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. • https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1186 • CWE-476: NULL Pointer Dereference •

CVSS: 8.8EPSS: 0%CPEs: 23EXPL: 0

13 Dec 2022 — Windows Graphics Component Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de Windows Graphics Component. This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the StretchBlt graphics primitive. The issue results from the lack of pro... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41121 •

CVSS: 6.5EPSS: 1%CPEs: 4EXPL: 0

10 May 2022 — Remote Desktop Protocol Client Information Disclosure Vulnerability Una vulnerabilidad de Divulgación de Información de Remote Desktop Protocol Client • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26940 •