Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): Windows
- Search Type: Search All
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-38144 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: September 12, 2023; 1:15:17 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-38143 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: September 12, 2023; 1:15:17 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-38142 |
Windows Kernel Elevation of Privilege Vulnerability Published: September 12, 2023; 1:15:17 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-38141 |
Windows Kernel Elevation of Privilege Vulnerability Published: September 12, 2023; 1:15:16 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-38140 |
Windows Kernel Information Disclosure Vulnerability Published: September 12, 2023; 1:15:16 PM -0400 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-38139 |
Windows Kernel Elevation of Privilege Vulnerability Published: September 12, 2023; 1:15:16 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36805 |
Windows MSHTML Platform Security Feature Bypass Vulnerability Published: September 12, 2023; 1:15:16 PM -0400 |
V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2023-36804 |
Windows GDI Elevation of Privilege Vulnerability Published: September 12, 2023; 1:15:16 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-36803 |
Windows Kernel Information Disclosure Vulnerability Published: September 12, 2023; 1:15:15 PM -0400 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-35355 |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Published: September 12, 2023; 1:15:09 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-4759 |
Arbitrary File Overwrite in Eclipse JGit <= 6.6.0 In Eclipse JGit, all versions <= 6.6.0.202305301015-r, a symbolic link present in a specially crafted git repository can be used to write a file to locations outside the working tree when this repository is cloned with JGit to a case-insensitive filesystem, or when a checkout from a clone of such a repository is performed on a case-insensitive filesystem. This can happen on checkout (DirCacheCheckout), merge (ResolveMerger via its WorkingTreeUpdater), pull (PullCommand using merge), and when applying a patch (PatchApplier). This can be exploited for remote code execution (RCE), for instance if the file written outside the working tree is a git filter that gets executed on a subsequent git command. The issue occurs only on case-insensitive filesystems, like the default filesystems on Windows and macOS. The user performing the clone or checkout must have the rights to create symbolic links for the problem to occur, and symbolic links must be enabled in the git configuration. Setting git configuration option core.symlinks = false before checking out avoids the problem. The issue was fixed in Eclipse JGit version 6.6.1.202309021850-r and 6.7.0.202309050840-r, available via Maven Central https://repo1.maven.org/maven2/org/eclipse/jgit/ and repo.eclipse.org https://repo.eclipse.org/content/repositories/jgit-releases/ . The JGit maintainers would like to thank RyotaK for finding and reporting this issue. Published: September 12, 2023; 6:15:29 AM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2022-4896 |
Cyber Control, in its 1.650 version, is affected by a vulnerability in the generation on the server of pop-up windows with the messages "PNTMEDIDAS", "PEDIR", "HAYDISCOA" or "SPOOLER". A complete denial of service can be achieved by sending multiple requests simultaneously on a core. Published: September 12, 2023; 4:15:13 AM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-35674 |
In onCreate of WindowState.java, there is a possible way to launch a background activity due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Published: September 11, 2023; 5:15:42 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-4576 |
On Windows, an integer overflow could occur in `RecordedSourceSurfaceCreation` which resulted in a heap buffer overflow potentially leaking sensitive data that could have led to a sandbox escape. *This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 117, Firefox ESR < 102.15, Firefox ESR < 115.2, Thunderbird < 102.15, and Thunderbird < 115.2. Published: September 11, 2023; 5:15:09 AM -0400 |
V3.1: 8.6 HIGH V2.0:(not available) |
CVE-2023-4807 |
Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue. Published: September 08, 2023; 8:15:08 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-32470 |
Dell Digital Delivery versions prior to 5.0.82.0 contain an Insecure Operation on Windows Junction / Mount Point vulnerability. A local malicious user could potentially exploit this vulnerability to create arbitrary folder leading to permanent Denial of Service (DOS). Published: September 08, 2023; 2:15:07 AM -0400 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2022-27599 |
An insertion of sensitive information into Log file vulnerability has been reported to affect product. If exploited, the vulnerability possibly provides local authenticated administrators with an additional, less-protected path to acquiring the information via unspecified vectors. We have already fixed the vulnerability in the following version: Windows 10 SP1, Windows 11, Mac OS, and Mac M1: QVR Pro Client 2.3.0.0420 and later Published: September 07, 2023; 10:15:07 PM -0400 |
V3.1: 4.4 MEDIUM V2.0:(not available) |
CVE-2023-0925 |
Version 10.11 of webMethods OneData runs an embedded instance of Azul Zulu Java 11.0.15 which hosts a Java RMI registry (listening on TCP port 2099 by default) and two RMI interfaces (listening on a single, dynamically assigned TCP high port). Port 2099 serves as a Java Remote Method Invocation (RMI) registry which allows for remotely loading and processing data via RMI interfaces. An unauthenticated attacker with network connectivity to the RMI registry and RMI interface ports can abuse this functionality to instruct the webMethods OneData application to load a malicious serialized Java object as a parameter to one of the available Java methods presented by the RMI interface. Once deserialized on the vulnerable server, the malicious code runs as whichever operating system account is used to run the software, which in most cases is the local System account on Windows. Published: September 06, 2023; 2:15:07 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-32163 |
Wacom Drivers for Windows Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Tablet Service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-16857. Published: September 06, 2023; 1:15:42 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-32162 |
Wacom Drivers for Windows Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the WacomInstallI.txt file by the PrefUtil.exe utility. The issue results from incorrect permissions on the WacomInstallI.txt file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-16318. Published: September 06, 2023; 1:15:42 AM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |