<p>An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles junction points. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context.</p><p>To exploit this vulnerability, an attacker wou...
7.8CVSS
7.9AI Score
0.001EPSS
<p>A denial of service vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could cause a remote denial of service against a system.</p><p>Exploitation of the vulnerability requires ...
4.7CVSS
5.2AI Score
0.003EPSS
7.8CVSS
7.8AI Score
0.0004EPSS
7.8CVSS
7.8AI Score
0.0004EPSS
7.8CVSS
7.8AI Score
0.0004EPSS
7.8CVSS
7.8AI Score
0.0004EPSS
7.8CVSS
7.8AI Score
0.0004EPSS
7.8CVSS
7.8AI Score
0.0004EPSS
7.8CVSS
7.8AI Score
0.0004EPSS
<p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p><p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privi...
7.8CVSS
8.1AI Score
0.0004EPSS
<p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p><p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privi...
7.8CVSS
8.1AI Score
0.0004EPSS
<p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p><p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privi...
7.8CVSS
8.1AI Score
0.0004EPSS
<p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p><p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privi...
7.8CVSS
8.1AI Score
0.0004EPSS
<p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p><p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privi...
7.8CVSS
8.1AI Score
0.0004EPSS
<p>An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.</p><p>To exploit the vulnerability, an attacker would first need code execution on a ...
7.8CVSS
8.2AI Score
0.0004EPSS
6.5CVSS
6.9AI Score
0.001EPSS
7.7CVSS
7.5AI Score
0.004EPSS
7CVSS
7.8AI Score
0.0004EPSS
5.5CVSS
6.9AI Score
0.0004EPSS
7.8CVSS
7.9AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
7CVSS
7.5AI Score
0.0004EPSS
7.8CVSS
7.5AI Score
0.001EPSS
7.8CVSS
8.4AI Score
0.0004EPSS
7.8CVSS
7.7AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
7.8CVSS
8AI Score
0.0004EPSS
7.8CVSS
8.4AI Score
0.0004EPSS
7.8CVSS
7.7AI Score
0.0004EPSS
7.8CVSS
7.7AI Score
0.0004EPSS
7.8CVSS
7.7AI Score
0.0004EPSS
7.8CVSS
7.7AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
7.8CVSS
7.7AI Score
0.0004EPSS
7.8CVSS
7.7AI Score
0.0004EPSS
7.8CVSS
7.7AI Score
0.0004EPSS
7.8CVSS
7.7AI Score
0.0004EPSS
7.8CVSS
8.4AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
7.8CVSS
8.4AI Score
0.0004EPSS
6.5CVSS
7.7AI Score
0.002EPSS
7.8CVSS
8.4AI Score
0.0004EPSS
8.8CVSS
9.2AI Score
0.038EPSS
7.8CVSS
8AI Score
0.0004EPSS
7.8CVSS
8AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
7AI Score
0.0004EPSS
7.5CVSS
8.2AI Score
0.002EPSS
A security feature bypass vulnerability exists in the way Key Distribution Center (KDC) determines if a service ticket can be used for delegation via Kerberos Constrained Delegation (KCD).To exploit the vulnerability, a compromised service that is configured to use KCD could tamper with a service t...