8.8CVSS
8.7AI Score
0.011EPSS
8.8CVSS
8.7AI Score
0.011EPSS
6.5CVSS
6.2AI Score
0.001EPSS
7.8CVSS
8.2AI Score
0.002EPSS
7.8CVSS
7.4AI Score
0.0004EPSS
7.8CVSS
7.5AI Score
0.001EPSS
8.1CVSS
8AI Score
0.009EPSS
7.8CVSS
7.5AI Score
0.0004EPSS
7.8CVSS
7.9AI Score
0.0004EPSS
8.1CVSS
8.3AI Score
0.005EPSS
7CVSS
6.8AI Score
0.0004EPSS
8.8CVSS
9.2AI Score
0.015EPSS
7.1CVSS
6.8AI Score
0.001EPSS
7.8CVSS
7.5AI Score
0.0005EPSS
6.6CVSS
6.4AI Score
0.0004EPSS
7.5CVSS
7.4AI Score
0.002EPSS
7.8CVSS
7.4AI Score
0.0004EPSS
7.8CVSS
8.4AI Score
0.0004EPSS
6.5CVSS
6.6AI Score
0.005EPSS
8.8CVSS
9.2AI Score
0.012EPSS
8.1CVSS
8.8AI Score
0.005EPSS
7.8CVSS
7.9AI Score
0.006EPSS
5.5CVSS
5.4AI Score
0.0004EPSS
6.5CVSS
6.7AI Score
0.001EPSS
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new....
4.2CVSS
5.9AI Score
0.002EPSS
An information disclosure vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An attacker could exploit this vulnerability by....
7.8CVSS
7.1AI Score
0.0004EPSS
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an...
7.8CVSS
8.1AI Score
0.001EPSS
7.8CVSS
7.5AI Score
0.0004EPSS
7.5CVSS
7.1AI Score
0.051EPSS
5.8CVSS
5.2AI Score
0.0004EPSS
An elevation of privilege vulnerability exists when the Windows CDP User Components improperly handle memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The...
7.8CVSS
7.8AI Score
0.0004EPSS
An elevation of privilege exists in SyncController.dll. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This...
6.5CVSS
7.4AI Score
0.002EPSS
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with...
7CVSS
7.5AI Score
0.0004EPSS
5.5CVSS
5.1AI Score
0.0004EPSS
5.5CVSS
5.9AI Score
0.0004EPSS
8.8CVSS
8.7AI Score
0.011EPSS
5.4CVSS
6AI Score
0.001EPSS
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with...
7.8CVSS
7.7AI Score
0.0004EPSS
An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete.....
7.8CVSS
7.6AI Score
0.0004EPSS
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The...
7.8CVSS
7.8AI Score
0.0004EPSS
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The...
7.8CVSS
7.8AI Score
0.0004EPSS
4.3CVSS
4.3AI Score
0.001EPSS
7.8CVSS
7.2AI Score
0.0005EPSS
7.8CVSS
7.2AI Score
0.0004EPSS
7.8CVSS
7.5AI Score
0.031EPSS
7.5CVSS
7.4AI Score
0.002EPSS
7.8CVSS
7.9AI Score
0.001EPSS
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG....
7.5CVSS
7.7AI Score
0.05EPSS