Page 41 of 3510 results (0.009 seconds)

CVSS: 7.3EPSS: 0%CPEs: 25EXPL: 0

Windows Storage Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en el almacenamiento de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30093 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 0

Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30091 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.0EPSS: 0%CPEs: 25EXPL: 1

Microsoft Streaming Service Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del servicio de transmisión de Microsoft • https://github.com/Dor00tkit/CVE-2024-30090 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30090 • CWE-822: Untrusted Pointer Dereference •

CVSS: 8.8EPSS: 0%CPEs: 17EXPL: 0

Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the win32kfull driver. The issue results from the lack of proper input validation. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30087 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 14EXPL: 0

Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del subsistema kernel de Windows Win32 This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within DirectComposition. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30086 • CWE-416: Use After Free •