Vulnerabilities (CVE)

Filtered by CWE-367
Total 333 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-23389 1 Microsoft 1 Malware Protection Engine 2024-05-29 N/A 6.3 MEDIUM
Microsoft Defender Elevation of Privilege Vulnerability
CVE-2023-38146 1 Microsoft 2 Windows 11 21h2, Windows 11 22h2 2024-05-29 N/A 8.8 HIGH
Windows Themes Remote Code Execution Vulnerability
CVE-2023-38141 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-05-29 N/A 7.8 HIGH
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-35311 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2024-05-29 N/A 8.8 HIGH
Microsoft Outlook Security Feature Bypass Vulnerability
CVE-2023-33156 1 Microsoft 1 Malware Protection Engine 2024-05-29 N/A 7.0 HIGH
Microsoft Defender Elevation of Privilege Vulnerability
CVE-2023-33154 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-05-29 N/A 9.8 CRITICAL
Windows Partition Management Driver Elevation of Privilege Vulnerability
CVE-2023-21555 1 Microsoft 15 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 12 more 2024-05-29 N/A 8.1 HIGH
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
CVE-2023-21537 1 Microsoft 15 Windows 10 1607, Windows 10 1809, Windows 10 20h2 and 12 more 2024-05-29 N/A 7.8 HIGH
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2023-35378 1 Microsoft 7 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 4 more 2024-05-29 N/A 7.0 HIGH
Windows Projected File System Elevation of Privilege Vulnerability
CVE-2023-29337 1 Microsoft 1 Nuget 2024-05-29 N/A 7.1 HIGH
NuGet Client Remote Code Execution Vulnerability
CVE-2024-21371 1 Microsoft 13 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 10 more 2024-05-29 N/A 7.0 HIGH
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-21362 1 Microsoft 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more 2024-05-29 N/A 5.5 MEDIUM
Windows Kernel Security Feature Bypass Vulnerability
CVE-2024-21792 2024-05-17 N/A 4.7 MEDIUM
Time-of-check Time-of-use race condition in Intel(R) Neural Compressor software before version 2.5.0 may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2024-3292 2024-05-17 N/A 8.2 HIGH
A race condition vulnerability exists where an authenticated, local attacker on a Windows Nessus Agent host could modify installation parameters at installation time, which could lead to the execution of arbitrary code on the Nessus host. - CVE-2024-3292
CVE-2024-3290 2024-05-17 N/A 8.2 HIGH
A race condition vulnerability exists where an authenticated, local attacker on a Windows Nessus host could modify installation parameters at installation time, which could lead to the execution of arbitrary code on the Nessus host
CVE-2024-28137 2024-05-14 N/A 7.8 HIGH
A local attacker with low privileges can perform a privilege escalation with an init script due to a TOCTOU vulnerability.
CVE-2024-2913 2024-05-07 N/A 6.5 MEDIUM
A race condition vulnerability exists in the mintplex-labs/anything-llm repository, specifically within the user invite acceptance process. Attackers can exploit this vulnerability by sending multiple concurrent requests to accept a single user invite, allowing the creation of multiple user accounts from a single invite link intended for only one user. This bypasses the intended security mechanism that restricts invite acceptance to a single user, leading to unauthorized user creation without detection in the invite tab. The issue is due to the lack of validation for concurrent requests in the backend.
CVE-2023-33119 2024-05-06 N/A 8.4 HIGH
Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.
CVE-2023-32156 2024-05-03 N/A 9.0 CRITICAL
Tesla Model 3 Gateway Firmware Signature Validation Bypass Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to execute privileged code on the Tesla infotainment system in order to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from improper error-handling during the update process. An attacker can leverage this vulnerability to execute code in the context of Tesla's Gateway ECU. Was ZDI-CAN-20734.
CVE-2023-27323 2024-05-03 N/A 7.8 HIGH
Parallels Desktop Updater Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Updater service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-18150.