Page 96 of 1698 results (0.006 seconds)

CVSS: 7.6EPSS: 5%CPEs: 15EXPL: 0

Windows SmartScreen Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad SmartScreen de Windows Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience and inject code to potentially gain code execution, which could lead to some data exposure, lack of system availability, or both. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21351 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.8EPSS: 0%CPEs: 16EXPL: 0

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability Proveedor Microsoft WDAC OLE DB para la vulnerabilidad de ejecución remota de código de SQL Server • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21350 • CWE-190: Integer Overflow or Wraparound •

CVSS: 8.8EPSS: 0%CPEs: 21EXPL: 0

Microsoft ActiveX Data Objects Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de objetos de datos ActiveX de Microsoft • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21349 • CWE-122: Heap-based Buffer Overflow •

CVSS: 4.6EPSS: 0%CPEs: 16EXPL: 0

Windows Kernel Information Disclosure Vulnerability Vulnerabilidad de divulgación de información del kernel de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21340 • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 7

Windows Kernel Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del kernel de Windows Microsoft Windows Kernel contains an exposed IOCTL with insufficient access control vulnerability within the IOCTL (input and output control) dispatcher in appid.sys that allows a local attacker to achieve privilege escalation. • https://www.exploit-db.com/exploits/51946 https://github.com/varwara/CVE-2024-21338 https://github.com/Crowdfense/CVE-2024-21338 https://github.com/hakaioffsec/CVE-2024-21338 https://github.com/Zombie-Kaiser/CVE-2024-21338-x64-build- https://github.com/UMU618/CVE-2024-21338 https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338 • CWE-822: Untrusted Pointer Dereference •