Page 56 of 601 results (0.007 seconds)

CVSS: 9.4EPSS: 2%CPEs: 14EXPL: 1

13 Feb 2024 — Internet Shortcut Files Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de archivos de acceso directo a Internet This vulnerability allows remote attackers to bypass the SmartScreen security feature to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Internet Shortcu... • https://github.com/lsr00ter/CVE-2024-21412_Water-Hydra • CWE-693: Protection Mechanism Failure •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 1

09 Jan 2024 — Windows Themes Spoofing Vulnerability Vulnerabilidad de suplantación de temas de Windows • https://github.com/sxyrxyy/CVE-2024-21320-POC • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 0%CPEs: 16EXPL: 0

09 Jan 2024 — Microsoft Message Queuing Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de Microsoft Message Queue Server • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21314 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 16EXPL: 0

09 Jan 2024 — Windows Cryptographic Services Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de servicios criptográficos de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21311 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

09 Jan 2024 — Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del controlador del minifiltro de archivos en la nube de Windows This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Only systems with long Win32 path support enabled are affected. The specific flaw... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21310 • CWE-197: Numeric Truncation Error •

CVSS: 6.8EPSS: 0%CPEs: 16EXPL: 0

09 Jan 2024 — Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability Vulnerabilidad de divulgación de información del servicio del subsistema de la autoridad de seguridad local de Microsoft • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20692 • CWE-326: Inadequate Encryption Strength CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 7.7EPSS: 0%CPEs: 10EXPL: 0

09 Jan 2024 — Windows Server Key Distribution Service Security Feature Bypass Omisión de la función de seguridad del servicio de distribución de claves de Windows Server • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21316 • CWE-20: Improper Input Validation •

CVSS: 5.4EPSS: 0%CPEs: 16EXPL: 0

09 Jan 2024 — Windows TCP/IP Information Disclosure Vulnerability Vulnerabilidad de divulgación de información TCP/IP de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21313 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 7.6EPSS: 0%CPEs: 14EXPL: 0

09 Jan 2024 — Remote Desktop Client Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código del cliente de escritorio remoto • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21307 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVSS: 4.4EPSS: 0%CPEs: 9EXPL: 1

09 Jan 2024 — Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la característica de seguridad de Hypervisor-Protected Code Integrity (HVCI) • https://github.com/tandasat/CVE-2024-21305 • CWE-732: Incorrect Permission Assignment for Critical Resource •