Page 53 of 300 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

Windows Kernel Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del kernel de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36725 • CWE-284: Improper Access Control •

CVSS: 7.8EPSS: 0%CPEs: 16EXPL: 0

Windows Internet Key Exchange (IKE) Extension Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Windows Internet Key Exchange (IKE) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36726 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

Named Pipe File System Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Named Pipe File System • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36729 • CWE-121: Stack-based Buffer Overflow •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the BLTRECORD::bStretch function in the win32kfull driver. The issue results from the lack of proper validation of user-supplied bitmaps prior to processing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36731 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

Win32k Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Win32k This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DEVLOCKBLTOBJ class in the win32kfull driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36732 •