Page 35 of 302 results (0.014 seconds)

CVSS: 7.3EPSS: 0%CPEs: 25EXPL: 0

Windows Storage Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en el almacenamiento de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30093 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.0EPSS: 0%CPEs: 25EXPL: 0

Microsoft Streaming Service Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del servicio de transmisión de Microsoft • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30090 • CWE-822: Untrusted Pointer Dereference •

CVSS: 8.8EPSS: 0%CPEs: 12EXPL: 0

Microsoft Streaming Service Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del servicio de transmisión de Microsoft This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Microsoft Kernel Streaming Server driver. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30089 • CWE-416: Use After Free •

CVSS: 6.7EPSS: 0%CPEs: 25EXPL: 0

Windows Distributed File System (DFS) Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del sistema de archivos distribuido (DFS) de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30063 • CWE-641: Improper Restriction of Names for Files and Other Resources •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del subsistema kernel de Windows Win32 • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049 • CWE-416: Use After Free •