Page 36 of 717 results (0.020 seconds)

CVSS: 5.5EPSS: 0%CPEs: 25EXPL: 0

13 Aug 2024 — Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38118 • CWE-908: Use of Uninitialized Resource •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

13 Aug 2024 — NTFS Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38117 • CWE-125: Out-of-bounds Read •

CVSS: 9.0EPSS: 0%CPEs: 25EXPL: 0

13 Aug 2024 — Windows IP Routing Management Snapin Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38116 • CWE-122: Heap-based Buffer Overflow •

CVSS: 10.0EPSS: 0%CPEs: 25EXPL: 0

13 Aug 2024 — Windows IP Routing Management Snapin Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38115 • CWE-122: Heap-based Buffer Overflow •

CVSS: 10.0EPSS: 0%CPEs: 25EXPL: 0

13 Aug 2024 — Windows IP Routing Management Snapin Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38114 • CWE-122: Heap-based Buffer Overflow •

CVSS: 8.1EPSS: 0%CPEs: 19EXPL: 0

13 Aug 2024 — Windows Kerberos Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29995 • CWE-208: Observable Timing Discrepancy •

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 0

13 Aug 2024 — Windows Power Dependency Coordinator Elevation of Privilege Vulnerability Microsoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to obtain SYSTEM privileges. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107 • CWE-416: Use After Free •

CVSS: 7.0EPSS: 0%CPEs: 16EXPL: 0

13 Aug 2024 — Windows Kernel Elevation of Privilege Vulnerability Microsoft Windows Kernel contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges. Successful exploitation of this vulnerability requires an attacker to win a race condition. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106 • CWE-591: Sensitive Data Storage in Improperly Locked Memory •

CVSS: 10.0EPSS: 0%CPEs: 25EXPL: 32

13 Aug 2024 — Windows TCP/IP Remote Code Execution Vulnerability • https://packetstorm.news/files/id/180422 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 8.8EPSS: 0%CPEs: 19EXPL: 0

13 Aug 2024 — Windows Mark of the Web Security Feature Bypass Vulnerability This vulnerability allows remote attackers to bypass the SmartScreen security feature on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the File Explorer user interface. The issue results from the lack of a proper security warning message. An attacker can leverage this vulnerability to e... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213 • CWE-693: Protection Mechanism Failure •