Page 66 of 14922 results (0.024 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

Microsoft Event Trace Log File Parsing Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en el análisis del archivo de registro de seguimiento de eventos de Microsoft • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30072 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

DHCP Server Service Denial of Service Vulnerability Vulnerabilidad de denegación de servicio del servicio del servidor DHCP • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30070 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 4.7EPSS: 0%CPEs: 12EXPL: 0

Windows Remote Access Connection Manager Information Disclosure Vulnerability Vulnerabilidad de divulgación de información del Administrador de conexión de acceso remoto de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30069 • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

A sym-linked file accessed via the repair function in Avast Antivirus <24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\SYSTEM. The vulnerability exists within the "Repair" (settings -> troubleshooting -> repair) feature, which attempts to delete a file in the current user's AppData directory as NT AUTHORITY\SYSTEM. A low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance. This issue affects Avast Antivirus prior to 24.2. Un archivo con enlace simbólico al que se accede a través de la función de reparación en Avast Antivirus &lt;24.2 en Windows puede permitir al usuario elevar privilegios para eliminar archivos arbitrarios o ejecutar procesos como NT AUTHORITY\SYSTEM. • https://support.norton.com/sp/static/external/tools/security-advisories.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-1284: Improper Validation of Specified Quantity in Input •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 1

Windows DWM Core Library Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de la librería principal DWM de Windows Microsoft DWM Core Library contains a privilege escalation vulnerability that allows an attacker to gain SYSTEM privileges. • https://github.com/fortra/CVE-2024-30051 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •