Page 2 of 293 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 26EXPL: 0

Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49113 • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 0%CPEs: 26EXPL: 0

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49112 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 0

Windows Common Log File System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49090 • CWE-822: Untrusted Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 0

Windows Common Log File System Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49088 • CWE-126: Buffer Over-read •

CVSS: 6.8EPSS: 0%CPEs: 26EXPL: 0

Windows File Explorer Information Disclosure Vulnerability This vulnerability allows remote attackers to delete arbitrary files or disclose sensitive information on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability. The specific flaw exists within the handling of filenames. The issue results from the lack of proper validation of filenames originating from untrusted sources, which may contain path traversal characters. An attacker can leverage this vulnerability to delete files or disclose information in the context of the current user. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49082 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •