Page 75 of 15189 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 25EXPL: 0

09 Apr 2024 — Windows rndismp6.sys Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Windows rndismp6.sys • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26253 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 25EXPL: 0

09 Apr 2024 — Windows rndismp6.sys Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código en Windows rndismp6.sys • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26252 • CWE-822: Untrusted Pointer Dereference •

CVSS: 6.7EPSS: 0%CPEs: 20EXPL: 0

09 Apr 2024 — Secure Boot Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de arranque seguro • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26250 • CWE-693: Protection Mechanism Failure •

CVSS: 7.1EPSS: 0%CPEs: 4EXPL: 0

09 Apr 2024 — Secure Boot Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de arranque seguro • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20689 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.1EPSS: 0%CPEs: 4EXPL: 0

09 Apr 2024 — Secure Boot Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de arranque seguro • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20688 • CWE-121: Stack-based Buffer Overflow •

CVSS: 6.7EPSS: 0%CPEs: 20EXPL: 0

09 Apr 2024 — Secure Boot Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de arranque seguro • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20669 • CWE-693: Protection Mechanism Failure •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

09 Apr 2024 — Microsoft Install Service Elevation of Privilege Vulnerability This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windows Installer service. By creating a symbolic link, an attacker can abuse the service to write arbitrary registry values. An attacker can leverage this vulnerabil... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26158 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 10.0EPSS: 2%CPEs: 7EXPL: 1

09 Apr 2024 — SmartScreen Prompt Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de solicitud de SmartScreen This vulnerability allows remote attackers to bypass the SmartScreen security feature to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Internet Shortcut (.URL) files. Th... • https://github.com/Sploitus/CVE-2024-29988-exploit • CWE-693: Protection Mechanism Failure •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

14 Mar 2024 — IBM Integration Bus for z/OS 10.1 through 10.1.0.3 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 284564. IBM Integration Bus para z/OS 10.1 a 10.1.0.3 es vulnerable a cross-site request forgery, lo que podría permitir a un atacante ejecutar acciones maliciosas y no autorizadas transmitidas por un usuario en el que confía el sitio web. ID de IBM X-Force: 284564. • https://exchange.xforce.ibmcloud.com/vulnerabilities/284564 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

12 Mar 2024 — Windows Compressed Folder Tampering Vulnerability Vulnerabilidad de manipulación de carpetas comprimidas de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26185 • CWE-73: External Control of File Name or Path •