Page 51 of 598 results (0.005 seconds)

CVSS: 5.5EPSS: 0%CPEs: 15EXPL: 0

Windows Power Management Service Information Disclosure Vulnerability Vulnerabilidad de divulgación de información en Windows Power Management Service • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36724 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

Windows Kernel Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del kernel de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36725 • CWE-284: Improper Access Control •

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

Windows Internet Key Exchange (IKE) Extension Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Windows Internet Key Exchange (IKE) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36726 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

Named Pipe File System Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Named Pipe File System • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36729 • CWE-121: Stack-based Buffer Overflow •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the BLTRECORD::bStretch function in the win32kfull driver. The issue results from the lack of proper validation of user-supplied bitmaps prior to processing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36731 • CWE-20: Improper Input Validation •