Page 33 of 291 results (0.009 seconds)

CVSS: 5.5EPSS: 0%CPEs: 12EXPL: 0

Windows Cryptographic Services Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de servicios criptográficos de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30096 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del Servicio de enrutamiento y acceso remoto de Windows (RRAS) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30095 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.3EPSS: 0%CPEs: 25EXPL: 0

Windows Storage Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en el almacenamiento de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30093 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.0EPSS: 0%CPEs: 25EXPL: 1

Microsoft Streaming Service Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del servicio de transmisión de Microsoft • https://github.com/Dor00tkit/CVE-2024-30090 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30090 • CWE-822: Untrusted Pointer Dereference •

CVSS: 8.8EPSS: 0%CPEs: 12EXPL: 0

Microsoft Streaming Service Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del servicio de transmisión de Microsoft This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Microsoft Kernel Streaming Server driver. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30089 • CWE-416: Use After Free •