Page 68 of 598 results (0.007 seconds)

CVSS: 6.5EPSS: 0%CPEs: 14EXPL: 0

Remote Procedure Call Runtime Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33164 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33155 • CWE-284: Improper Access Control •

CVSS: 9.8EPSS: 0%CPEs: 14EXPL: 0

Windows Partition Management Driver Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33154 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.4EPSS: 0%CPEs: 14EXPL: 0

Windows Netlogon Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21526 •

CVSS: 7.8EPSS: 3%CPEs: 14EXPL: 5

Windows Error Reporting Service Elevation of Privilege Vulnerability Microsoft Windows Error Reporting Service contains an unspecified vulnerability that allows for privilege escalation. • https://github.com/d0rb/CVE-2023-36874 https://github.com/Wh04m1001/CVE-2023-36874 https://github.com/crisprss/CVE-2023-36874 http://packetstormsecurity.com/files/174843/Microsoft-Error-Reporting-Local-Privilege-Elevation.html https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874 https://www.crowdstrike.com/blog/falcon-complete-zero-day-exploit-cve-2023-36874 https://github.com/Octoberfest7/CVE-2023-36874_BOF https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/ex • CWE-59: Improper Link Resolution Before File Access ('Link Following') •