Show filters
6,697 Total Results
Displaying 141-150 of 6,697
Sort by:
Attacker Value
Unknown
CVE-2014-4113
Disclosure Date: October 15, 2014 (last updated July 03, 2024)
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
1
Attacker Value
High
CVE-2010-2568
Disclosure Date: July 22, 2010 (last updated June 29, 2024)
Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.
1
Attacker Value
Very High
CVE-2022–26923 aka Certifried
Last updated January 02, 2025
Active Directory Domain Services Elevation of Privilege Vulnerability
1
Attacker Value
Unknown
CVE-2024-49080
Disclosure Date: December 12, 2024 (last updated January 13, 2025)
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
1
Attacker Value
Unknown
CVE-2024-49039
Disclosure Date: November 12, 2024 (last updated January 06, 2025)
Windows Task Scheduler Elevation of Privilege Vulnerability
1
Attacker Value
Unknown
CVE-2024-38213
Disclosure Date: August 13, 2024 (last updated August 15, 2024)
Windows Mark of the Web Security Feature Bypass Vulnerability
1
Attacker Value
Unknown
CVE-2024-38193
Disclosure Date: August 13, 2024 (last updated August 15, 2024)
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
1
Attacker Value
Unknown
CVE-2024-38202
Disclosure Date: August 08, 2024 (last updated January 12, 2025)
Summary
Microsoft was notified that an elevation of privilege vulnerability exists in Windows Update, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.
Microsoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. Note: Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this …
1
Attacker Value
Unknown
CVE-2024-38080
Disclosure Date: July 09, 2024 (last updated January 28, 2025)
Windows Hyper-V Elevation of Privilege Vulnerability
1
Attacker Value
Unknown
CVE-2023-50387
Disclosure Date: February 14, 2024 (last updated February 21, 2024)
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
1