Page 8 of 491 results (0.009 seconds)

CVSS: 7.0EPSS: 0%CPEs: 18EXPL: 0

Windows Kernel Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43511 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.8EPSS: 0%CPEs: 18EXPL: 0

Windows Secure Kernel Mode Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43516 • CWE-822: Untrusted Pointer Dereference •

CVSS: 8.4EPSS: 0%CPEs: 5EXPL: 1

A DLL Hijacking caused by drive remapping combined with a poisoning of the activation cache in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated attacker to elevate from a medium integrity process to a high integrity process without the intervention of a UAC prompt. • https://github.com/fortra/CVE-2024-6769 https://www.fortra.com/security/advisories/research/fr-2024-002 • CWE-426: Untrusted Search Path •

CVSS: 7.8EPSS: 0%CPEs: 32EXPL: 0

Windows Security Zone Mapping Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30073 • CWE-41: Improper Resolution of Path Equivalence •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

Windows Remote Desktop Licensing Service Spoofing Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455 • CWE-20: Improper Input Validation •