Page 25 of 607 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

10 Oct 2023 — Windows Kernel Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del kernel de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36725 • CWE-284: Improper Access Control •

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

10 Oct 2023 — Windows Internet Key Exchange (IKE) Extension Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Windows Internet Key Exchange (IKE) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36726 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

10 Oct 2023 — Named Pipe File System Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Named Pipe File System • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36729 • CWE-121: Stack-based Buffer Overflow •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

10 Oct 2023 — Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the BLTRECORD::bStretch function in the win32kfull driver. The issue results from the lack of proper validation of user-supplied bitmaps... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36731 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

10 Oct 2023 — Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DEVLOCKBLTOBJ class in the win32kfull driver. The issue results from the lack of proper locking when performing operations on an obj... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36732 •

CVSS: 8.1EPSS: 0%CPEs: 14EXPL: 0

10 Oct 2023 — Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Layer 2 Tunneling Protocol • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41774 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVSS: 8.1EPSS: 0%CPEs: 14EXPL: 0

10 Oct 2023 — Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Layer 2 Tunneling Protocol • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41773 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 1

10 Oct 2023 — Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k • https://github.com/R41N3RZUF477/CVE-2023-41772 • CWE-284: Improper Access Control •

CVSS: 8.1EPSS: 0%CPEs: 14EXPL: 0

10 Oct 2023 — Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Layer 2 Tunneling Protocol • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41771 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVSS: 8.1EPSS: 0%CPEs: 14EXPL: 0

10 Oct 2023 — Layer 2 Tunneling Protocol Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Layer 2 Tunneling Protocol • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41770 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •