Page 8 of 56 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 1

Windows Common Log File System Driver Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows Common Log File System Driver. Este ID de CVE es diferente de CVE-2022-35803 Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation. • https://github.com/fortra/CVE-2022-37969 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37969 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 27EXPL: 0

Win32k Elevation of Privilege Vulnerability This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of bitmap objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750 •

CVSS: 7.8EPSS: 32%CPEs: 19EXPL: 0

Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Microsoft Windows Support Diagnostic Tool (MSDT). Este ID de CVE es diferente de CVE-2022-35743 A remote code execution vulnerability exists when Microsoft Windows MSDT is called using the URL protocol from a calling application. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713 •

CVSS: 7.8EPSS: 0%CPEs: 21EXPL: 0

Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows CSRSS. Este ID de CVE es diferente de CVE-2022-22026, CVE-2022-22049 Microsoft Windows CSRSS contains an unspecified vulnerability that allows for privilege escalation to SYSTEM privileges. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22047 • CWE-426: Untrusted Search Path •

CVSS: 9.3EPSS: 96%CPEs: 18EXPL: 30

A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability. Una vulnerabilidad de Ejecución de Código Remota en Microsoft Windows Support Diagnostic Tool (MSDT) A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run code with the privileges of the calling application. • https://github.com/onecloudemoji/CVE-2022-30190 https://github.com/JMousqueton/PoC-CVE-2022-30190 https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed https://github.com/doocop/CVE-2022-30190 https://github.com/aminetitrofine/CVE-2022-30190 https://github.com/drgreenthumb93/CVE-2022-30190-follina https://github.com/DerZiad/CVE-2022-30190 https://github.com/sudoaza/CVE-2022-30190 https://github.com/arozx/CVE-2022-30190 https://github.com/winstxnhdw/CVE-2022-3019 • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •