Page 70 of 37740 results (0.083 seconds)

CVSS: 8.8EPSS: 0%CPEs: 25EXPL: 0

Windows IP Routing Management Snapin Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38114 • CWE-122: Heap-based Buffer Overflow •

CVSS: 9.8EPSS: 0%CPEs: 25EXPL: 16

Windows TCP/IP Remote Code Execution Vulnerability • https://github.com/zenzue/CVE-2024-38063-POC https://github.com/diegoalbuquerque/CVE-2024-38063 https://github.com/Sachinart/CVE-2024-38063-POC https://github.com/Sachinart/CVE-2024-38063-poc https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix https://github.com/noradlb1/CVE-2024-38063-VB https://github.com/Th3Tr1ckst3r/CVE-2024-38063 https://github.com/dweger-scripts/CVE-2024-38063-Remediation https://github.com/ynwarcs/CVE-2024-38063 https://github.com/haroonawanoffi • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 8.8EPSS: 1%CPEs: 20EXPL: 0

An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213 • CWE-693: Protection Mechanism Failure •

CVSS: 9.8EPSS: 0%CPEs: 25EXPL: 0

Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38199 • CWE-416: Use After Free •

CVSS: 7.5EPSS: 1%CPEs: 20EXPL: 0

Scripting Engine Memory Corruption Vulnerability Microsoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution via a specially crafted URL. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •