Page 47 of 365 results (0.007 seconds)

CVSS: 8.8EPSS: 0%CPEs: 25EXPL: 0

Windows Common Log File System Driver Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del controlador del sistema de archivos de registro común de Windows This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Common Log File System (CLFS). The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037 • CWE-125: Out-of-bounds Read •

CVSS: 6.5EPSS: 0%CPEs: 15EXPL: 0

Windows Deployment Services Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de los servicios de implementación de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30036 • CWE-41: Improper Resolution of Path Equivalence •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

Windows DWM Core Library Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de la librería principal DWM de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30035 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

Windows DWM Core Library Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de la librería principal DWM de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30032 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

Windows CNG Key Isolation Service Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del servicio de aislamiento de claves CNG de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30031 • CWE-416: Use After Free •