Page 39 of 623 results (0.006 seconds)

CVSS: 5.5EPSS: 0%CPEs: 14EXPL: 0

11 Jul 2023 — Windows Cryptographic Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33174 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

11 Jul 2023 — Remote Procedure Call Runtime Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33173 • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

11 Jul 2023 — Remote Procedure Call Runtime Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33172 • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

11 Jul 2023 — Remote Procedure Call Runtime Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33169 • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

11 Jul 2023 — Remote Procedure Call Runtime Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33168 • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

11 Jul 2023 — Remote Procedure Call Runtime Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33167 • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 0

11 Jul 2023 — Remote Procedure Call Runtime Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33166 • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

11 Jul 2023 — Windows Win32k Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21756 • CWE-416: Use After Free •

CVSS: 6.8EPSS: 0%CPEs: 15EXPL: 0

14 Jun 2023 — Windows CryptoAPI Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24937 • CWE-20: Improper Input Validation •

CVSS: 4.7EPSS: 0%CPEs: 17EXPL: 1

13 Jun 2023 — Windows Kernel Information Disclosure Vulnerability Due to some design problems in how transactions are implemented in the registry, it is possible for a low-privileged local attacker to force a non-atomic outcome of a transaction used by another high-privileged process in the system. • https://packetstorm.news/files/id/173310 • CWE-668: Exposure of Resource to Wrong Sphere •