Page 98 of 3633 results (0.020 seconds)

CVSS: 9.8EPSS: 9%CPEs: 25EXPL: 0

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Microsoft Windows. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the Pragmatic General Multicast protocol. The issue results from the lack of proper validation of the Transmission Group Size field, which can result in corruption of an in-memory structure. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29363 • CWE-122: Heap-based Buffer Overflow •

CVSS: 8.8EPSS: 3%CPEs: 16EXPL: 0

Remote Desktop Client Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29362 • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

GDI Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29359 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

Windows GDI Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29358 • CWE-416: Use After Free •

CVSS: 8.1EPSS: 0%CPEs: 25EXPL: 0

Windows Group Policy Elevation of Privilege Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29351 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •