Page 26 of 544 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 0

Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38237 • CWE-122: Heap-based Buffer Overflow •

CVSS: 6.5EPSS: 0%CPEs: 17EXPL: 0

Windows Hyper-V Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38235 • CWE-416: Use After Free •

CVSS: 6.5EPSS: 0%CPEs: 26EXPL: 0

Windows Networking Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 16EXPL: 0

Windows Remote Desktop Licensing Service Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231 • CWE-285: Improper Authorization •

CVSS: 5.4EPSS: 0%CPEs: 26EXPL: 0

Windows Mark of the Web Security Feature Bypass Vulnerability Microsoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217 • CWE-693: Protection Mechanism Failure •