Page 93 of 623 results (0.011 seconds)

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

Windows Kernel Elevation of Privilege Vulnerability In Windows Registry, security descriptors are shared by multiple keys, and thus reference counted via the _CM_KEY_SECURITY.ReferenceCount field. It is critical for system security that the kernel correctly keeps track of the references, so that the sum of the ReferenceCount fields is equal to the number of keys in the hive at all times (with small exceptions for things like transacted and not yet committed operations etc.). If the ReferenceCount of any descriptor drops below the true number of its active references, it may result in a use-after-free condition and memory corruption. Similarly, if the field becomes inadequately large, it may be possible to overflow it and also trigger a use-after-free. A bug of the latter type is described in this report. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28248 • CWE-190: Integer Overflow or Wraparound •

CVSS: 6.8EPSS: 0%CPEs: 8EXPL: 0

Windows Lock Screen Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28270 • CWE-863: Incorrect Authorization •

CVSS: 6.8EPSS: 0%CPEs: 13EXPL: 0

Windows Boot Manager Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28269 • CWE-122: Heap-based Buffer Overflow •

CVSS: 8.8EPSS: 2%CPEs: 13EXPL: 0

Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28243 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 5.5EPSS: 0%CPEs: 15EXPL: 0

Windows Common Log File System Driver Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28266 • CWE-126: Buffer Over-read •