{"cves":[{"cve_id":"CVE-2026-20940","summary":"Heap-based buffer overflow in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.1004,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20940"],"published_time":"2026-01-13T18:16:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20931","summary":"External control of file name or path in Windows Telephony Service allows an authorized attacker to elevate privileges over an adjacent network.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00789,"ranking_epss":0.73906,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20931"],"published_time":"2026-01-13T18:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20936","summary":"Out-of-bounds read in Windows NDIS allows an authorized attacker to disclose information with a physical attack.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.1166,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20936"],"published_time":"2026-01-13T18:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20925","summary":"External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00104,"ranking_epss":0.2838,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20925"],"published_time":"2026-01-13T18:16:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20927","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to deny service over a network.","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00035,"ranking_epss":0.10236,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20927"],"published_time":"2026-01-13T18:16:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20929","summary":"Improper access control in Windows HTTP.sys allows an authorized attacker to elevate privileges over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13524,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20929"],"published_time":"2026-01-13T18:16:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20921","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.1631,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20921"],"published_time":"2026-01-13T18:16:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20922","summary":"Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07387,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20922"],"published_time":"2026-01-13T18:16:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20875","summary":"Null pointer dereference in Windows Local Security Authority Subsystem Service (LSASS) allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23628,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20875"],"published_time":"2026-01-13T18:16:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20868","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00131,"ranking_epss":0.32594,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20868","https://www.vicarius.io/vsociety/posts/cve-2026-20868-detection-script-heap-based-buffer-overflow-vulnerability-affecting-windows-rras","https://www.vicarius.io/vsociety/posts/cve-2026-20868-mitigation-script-heap-based-buffer-overflow-vulnerability-affecting-windows-rras"],"published_time":"2026-01-13T18:16:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20869","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Local Session Manager (LSM) allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06691,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20869"],"published_time":"2026-01-13T18:16:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20872","summary":"External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24734,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20872","https://www.vicarius.io/vsociety/posts/cve-2026-20872-detection-script-spoofing-vulnerability-in-windows-ntlm","https://www.vicarius.io/vsociety/posts/cve-2026-20872-mitigation-script-spoofing-vulnerability-in-windows-ntlm"],"published_time":"2026-01-13T18:16:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20860","summary":"Access of resource using incompatible type ('type confusion') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00085,"ranking_epss":0.24613,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20860"],"published_time":"2026-01-13T18:16:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20847","summary":"Exposure of sensitive information to an unauthorized actor in Windows Shell allows an authorized attacker to perform spoofing over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00134,"ranking_epss":0.32977,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20847"],"published_time":"2026-01-13T18:16:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20849","summary":"Reliance on untrusted inputs in a security decision in Windows Kerberos allows an authorized attacker to elevate privileges over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00088,"ranking_epss":0.25169,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20849"],"published_time":"2026-01-13T18:16:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20839","summary":"Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00037,"ranking_epss":0.10909,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20839"],"published_time":"2026-01-13T18:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20840","summary":"Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07387,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20840"],"published_time":"2026-01-13T18:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20843","summary":"Improper access control in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08935,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20843"],"published_time":"2026-01-13T18:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20833","summary":"Use of a broken or risky cryptographic algorithm in Windows Kerberos allows an authorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08187,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20833"],"published_time":"2026-01-13T18:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20834","summary":"Absolute path traversal in Windows Shell allows an unauthorized attacker to perform spoofing with a physical attack.","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23539,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20834"],"published_time":"2026-01-13T18:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20828","summary":"Out-of-bounds read in Windows Internet Connection Sharing (ICS) allows an unauthorized attacker to disclose information with a physical attack.","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13584,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20828"],"published_time":"2026-01-13T18:16:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20831","summary":"Time-of-check time-of-use (toctou) race condition in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.0666,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20831"],"published_time":"2026-01-13T18:16:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20820","summary":"Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00025,"ranking_epss":0.06919,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20820"],"published_time":"2026-01-13T18:16:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20821","summary":"Exposure of sensitive information to an unauthorized actor in Windows Remote Procedure Call allows an unauthorized attacker to disclose information locally.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00041,"ranking_epss":0.12309,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20821"],"published_time":"2026-01-13T18:16:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-20816","summary":"Time-of-check time-of-use (toctou) race condition in Windows Installer allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00024,"ranking_epss":0.06591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20816"],"published_time":"2026-01-13T18:16:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2026-0386","summary":"Improper access control in Windows Deployment Services allows an unauthorized attacker to execute code over an adjacent network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.2246,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0386"],"published_time":"2026-01-13T18:16:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-64678","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00092,"ranking_epss":0.25711,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64678"],"published_time":"2025-12-09T18:16:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62571","summary":"Improper input validation in Windows Installer allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00161,"ranking_epss":0.36992,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62571"],"published_time":"2025-12-09T18:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62470","summary":"Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00106,"ranking_epss":0.28624,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62470"],"published_time":"2025-12-09T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62472","summary":"Use of uninitialized resource in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00261,"ranking_epss":0.49505,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62472"],"published_time":"2025-12-09T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62473","summary":"Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00124,"ranking_epss":0.316,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62473"],"published_time":"2025-12-09T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62474","summary":"Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00097,"ranking_epss":0.26748,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62474"],"published_time":"2025-12-09T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62549","summary":"Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00223,"ranking_epss":0.45009,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62549","https://www.vicarius.io/vsociety/posts/cve-2025-62549-detection-script-rce-vulnerability-in-windows-routing-and-remote-access-service","https://www.vicarius.io/vsociety/posts/cve-2025-62549-mitigation-script-rce-vulnerability-in-windows-routing-and-remote-access-service"],"published_time":"2025-12-09T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62466","summary":"Null pointer dereference in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00106,"ranking_epss":0.28624,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62466"],"published_time":"2025-12-09T18:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62458","summary":"Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18385,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62458"],"published_time":"2025-12-09T18:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62455","summary":"Improper input validation in Windows Message Queuing allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00076,"ranking_epss":0.22824,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62455"],"published_time":"2025-12-09T18:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54100","summary":"Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00352,"ranking_epss":0.57656,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100","https://www.vicarius.io/vsociety/posts/cve-2025-54100-detect-powershell-vulnerability","https://www.vicarius.io/vsociety/posts/cve-2025-54100-mitigate-powershell-vulnerability"],"published_time":"2025-12-09T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62452","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62452"],"published_time":"2025-11-11T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62217","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00027,"ranking_epss":0.07379,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62217"],"published_time":"2025-11-11T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-62213","summary":"Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14805,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62213"],"published_time":"2025-11-11T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-60724","summary":"Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00144,"ranking_epss":0.34695,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60724"],"published_time":"2025-11-11T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-60719","summary":"Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14805,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60719"],"published_time":"2025-11-11T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-60720","summary":"Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00049,"ranking_epss":0.15177,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60720"],"published_time":"2025-11-11T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-60714","summary":"Heap-based buffer overflow in Windows OLE allows an unauthorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00049,"ranking_epss":0.14958,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60714"],"published_time":"2025-11-11T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-60715","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60715"],"published_time":"2025-11-11T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-60704","summary":"Missing cryptographic step in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00038,"ranking_epss":0.1126,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60704"],"published_time":"2025-11-11T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-60705","summary":"Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00064,"ranking_epss":0.19985,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60705"],"published_time":"2025-11-11T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-60709","summary":"Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00049,"ranking_epss":0.15177,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60709"],"published_time":"2025-11-11T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59513","summary":"Out-of-bounds read in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0004,"ranking_epss":0.12005,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59513"],"published_time":"2025-11-11T18:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59514","summary":"Improper privilege management in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00045,"ranking_epss":0.13825,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59514"],"published_time":"2025-11-11T18:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-60703","summary":"Untrusted pointer dereference in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00049,"ranking_epss":0.15177,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60703"],"published_time":"2025-11-11T18:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59295","summary":"Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00353,"ranking_epss":0.57713,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295"],"published_time":"2025-10-14T17:16:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59282","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00379,"ranking_epss":0.59471,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282","https://www.vicarius.io/vsociety/posts/cve-2025-59282-detection-script-race-condition-in-microsoft-inbox-com-objects","https://www.vicarius.io/vsociety/posts/cve-2025-59282-mitigation-script-race-condition-in-microsoft-inbox-com-objects"],"published_time":"2025-10-14T17:16:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59278","summary":"Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00089,"ranking_epss":0.2536,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278"],"published_time":"2025-10-14T17:16:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59280","summary":"Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network.","cvss":3.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.1,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11496,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280"],"published_time":"2025-10-14T17:16:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59275","summary":"Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24801,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275"],"published_time":"2025-10-14T17:16:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59277","summary":"Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00089,"ranking_epss":0.2536,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277"],"published_time":"2025-10-14T17:16:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59242","summary":"Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00078,"ranking_epss":0.23231,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242"],"published_time":"2025-10-14T17:16:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59230","summary":"Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03724,"ranking_epss":0.88,"kev":true,"propose_action":"Microsoft Windows contains an improper access control vulnerability in Windows Remote Access Connection Manager which could allow an authorized attacker to elevate privileges locally.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230","https://www.vicarius.io/vsociety/posts/cve-2025-59230-detection-script-elevation-of-privilege-vulnerability-affecting-windows-rasman","https://www.vicarius.io/vsociety/posts/cve-2025-59230-mitigation-script-elevation-of-privilege-vulnerability-affecting-windows-rasman","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59230"],"published_time":"2025-10-14T17:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59214","summary":"Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00133,"ranking_epss":0.32819,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214","https://cymulate.com/blog/ntlm-leak-cve-2025-59214/","https://github.com/rubenformation/CVE-2025-50154/","https://www.vicarius.io/vsociety/posts/cve-2025-59214-detection-script-windows-file-explorer-spoofing-vulnerability","https://www.vicarius.io/vsociety/posts/cve-2025-59214-mitigation-script-windows-file-explorer-spoofing-vulnerability"],"published_time":"2025-10-14T17:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59205","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00032,"ranking_epss":0.09026,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205"],"published_time":"2025-10-14T17:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59208","summary":"Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13244,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208"],"published_time":"2025-10-14T17:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59198","summary":"Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally.","cvss":5.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.0,"cvss_v4":null,"epss":0.00061,"ranking_epss":0.19134,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198"],"published_time":"2025-10-14T17:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59201","summary":"Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.17007,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201"],"published_time":"2025-10-14T17:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59196","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SSDP Service allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08628,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196"],"published_time":"2025-10-14T17:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59187","summary":"Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00086,"ranking_epss":0.24801,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187"],"published_time":"2025-10-14T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-59190","summary":"Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00062,"ranking_epss":0.19264,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190"],"published_time":"2025-10-14T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58739","summary":"Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00076,"ranking_epss":0.22789,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739"],"published_time":"2025-10-14T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58732","summary":"Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.16178,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732"],"published_time":"2025-10-14T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58733","summary":"Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.16178,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733"],"published_time":"2025-10-14T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58735","summary":"Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.16178,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735"],"published_time":"2025-10-14T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58736","summary":"Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.16178,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736"],"published_time":"2025-10-14T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58726","summary":"Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00143,"ranking_epss":0.34655,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726","https://www.vicarius.io/vsociety/posts/cve-2025-58726-detection-script-improper-access-control-affecting-smb-server-by-microsoft","https://www.vicarius.io/vsociety/posts/cve-2025-58726-mitigation-script-improper-access-control-affecting-smb-server-by-microsoft"],"published_time":"2025-10-14T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58729","summary":"Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00207,"ranking_epss":0.43108,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729"],"published_time":"2025-10-14T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58730","summary":"Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00052,"ranking_epss":0.16178,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730"],"published_time":"2025-10-14T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58718","summary":"Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00059,"ranking_epss":0.18464,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718"],"published_time":"2025-10-14T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58725","summary":"Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11858,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725"],"published_time":"2025-10-14T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55700","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14564,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700"],"published_time":"2025-10-14T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55701","summary":"Improper validation of specified type of input in Microsoft Windows allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00089,"ranking_epss":0.2536,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701"],"published_time":"2025-10-14T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58714","summary":"Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.17007,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714"],"published_time":"2025-10-14T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-58717","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00048,"ranking_epss":0.14564,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717"],"published_time":"2025-10-14T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55695","summary":"Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13302,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695"],"published_time":"2025-10-14T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55678","summary":"Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00039,"ranking_epss":0.11858,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678"],"published_time":"2025-10-14T17:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55335","summary":"Use after free in Windows NTFS allows an unauthorized attacker to elevate privileges locally.","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00031,"ranking_epss":0.08628,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335"],"published_time":"2025-10-14T17:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55248","summary":"Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.","cvss":4.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00029,"ranking_epss":0.08003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248"],"published_time":"2025-10-14T17:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24990","summary":"Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems.  This is an announcement of the upcoming removal of ltmdm64.sys driver.  The driver has been removed in the October cumulative update.\nFax modem hardware dependent on this specific driver will no longer work on Windows.\nMicrosoft recommends removing any existing dependencies on this hardware.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03896,"ranking_epss":0.88286,"kev":true,"propose_action":"Microsoft Windows Agere Modem Driver contains an untrusted pointer dereference vulnerability that allows for privilege escalation. An attacker who successfully exploited this vulnerability could gain administrator privileges.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990","https://www.vicarius.io/vsociety/posts/cve-2025-24990-detection-script-elevation-of-privilege-vulnerability-in-agere-modem-driver-affecting-windows","https://www.vicarius.io/vsociety/posts/cve-2025-24990-mitigation-script-elevation-of-privilege-vulnerability-in-agere-modem-driver-affecting-windows","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24990"],"published_time":"2025-10-14T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-25004","summary":"Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00044,"ranking_epss":0.13269,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004"],"published_time":"2025-10-14T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24052","summary":"Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems.  This is an announcement of the upcoming removal of ltmdm64.sys driver.  The driver has been removed in the October cumulative update.\nFax modem hardware dependent on this specific driver will no longer work on Windows.\nMicrosoft recommends removing any existing dependencies on this hardware.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23724,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052"],"published_time":"2025-10-14T17:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55234","summary":"SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks.\nThe SMB Server already supports mechanisms for hardening against relay attacks:\n\nSMB Server signing\nSMB Server Extended Protection for Authentication (EPA)\n\nMicrosoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks.\nIf you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks:\n\nAssess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates.  See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing &amp; SMB Server EPA.\nAdopt appropriate SMB Server hardening measures.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00293,"ranking_epss":0.52717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234","https://www.vicarius.io/vsociety/posts/cve-2025-55234-detection-script-smb-server-vulnerability-affecting-microsoft-systems","https://www.vicarius.io/vsociety/posts/cve-2025-55234-mitigation-script-smb-server-vulnerability-affecting-microsoft-systems"],"published_time":"2025-09-09T17:16:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55225","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00061,"ranking_epss":0.1907,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55225"],"published_time":"2025-09-09T17:16:05","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55226","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to execute code locally.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00021,"ranking_epss":0.05592,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55226"],"published_time":"2025-09-09T17:16:05","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54916","summary":"Stack-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00104,"ranking_epss":0.28313,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54916"],"published_time":"2025-09-09T17:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54917","summary":"Protection mechanism failure in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54917"],"published_time":"2025-09-09T17:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54918","summary":"Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00189,"ranking_epss":0.40754,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54918"],"published_time":"2025-09-09T17:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54911","summary":"Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00072,"ranking_epss":0.21895,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54911"],"published_time":"2025-09-09T17:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54912","summary":"Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00073,"ranking_epss":0.22197,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54912"],"published_time":"2025-09-09T17:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54915","summary":"Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00228,"ranking_epss":0.45596,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54915"],"published_time":"2025-09-09T17:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54895","summary":"Integer overflow or wraparound in Windows SPNEGO Extended Negotiation allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22336,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54895"],"published_time":"2025-09-09T17:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54894","summary":"Local Security Authority Subsystem Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00096,"ranking_epss":0.26542,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54894"],"published_time":"2025-09-09T17:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54113","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.001,"ranking_epss":0.27648,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54113"],"published_time":"2025-09-09T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54109","summary":"Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00291,"ranking_epss":0.5255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54109"],"published_time":"2025-09-09T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54110","summary":"Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00069,"ranking_epss":0.21156,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54110"],"published_time":"2025-09-09T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54104","summary":"Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00291,"ranking_epss":0.5255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54104"],"published_time":"2025-09-09T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54107","summary":"Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00072,"ranking_epss":0.21909,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54107"],"published_time":"2025-09-09T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54098","summary":"Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0013,"ranking_epss":0.32505,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54098"],"published_time":"2025-09-09T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54099","summary":"Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20612,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54099"],"published_time":"2025-09-09T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54094","summary":"Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00291,"ranking_epss":0.5255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54094"],"published_time":"2025-09-09T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54095","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22404,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54095"],"published_time":"2025-09-09T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54096","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23681,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54096"],"published_time":"2025-09-09T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54097","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23681,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54097"],"published_time":"2025-09-09T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53810","summary":"Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00291,"ranking_epss":0.5255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53810"],"published_time":"2025-09-09T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-54093","summary":"Time-of-check time-of-use (toctou) race condition in Windows TCP/IP allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16763,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54093"],"published_time":"2025-09-09T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53806","summary":"Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23681,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53806"],"published_time":"2025-09-09T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53808","summary":"Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00291,"ranking_epss":0.5255,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53808"],"published_time":"2025-09-09T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53799","summary":"Use of uninitialized resource in Windows Imaging Component allows an unauthorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00126,"ranking_epss":0.31919,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53799"],"published_time":"2025-09-09T17:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53796","summary":"Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23681,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53796"],"published_time":"2025-09-09T17:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53797","summary":"Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22404,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53797"],"published_time":"2025-09-09T17:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53798","summary":"Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22404,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53798"],"published_time":"2025-09-09T17:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-55230","summary":"Untrusted pointer dereference in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.2632,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55230"],"published_time":"2025-08-21T20:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53778","summary":"Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00319,"ranking_epss":0.54975,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53778","https://www.vicarius.io/vsociety/posts/cve-2025-53778-detection-script-improper-authentication-vulnerability-affecting-windows-ntlm","https://www.vicarius.io/vsociety/posts/cve-2025-53778-mitigation-script-improper-authentication-vulnerability-affecting-windows-ntlm"],"published_time":"2025-08-12T18:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53766","summary":"Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.00554,"ranking_epss":0.6813,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53766"],"published_time":"2025-08-12T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53720","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00082,"ranking_epss":0.23987,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53720"],"published_time":"2025-08-12T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53722","summary":"Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.07901,"ranking_epss":0.92044,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53722"],"published_time":"2025-08-12T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53154","summary":"Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00077,"ranking_epss":0.22898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53154"],"published_time":"2025-08-12T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53718","summary":"Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15822,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53718"],"published_time":"2025-08-12T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53719","summary":"Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00274,"ranking_epss":0.50892,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53719"],"published_time":"2025-08-12T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53147","summary":"Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15822,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53147"],"published_time":"2025-08-12T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53148","summary":"Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00274,"ranking_epss":0.50892,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53148"],"published_time":"2025-08-12T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53149","summary":"Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00514,"ranking_epss":0.66603,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53149","https://www.crowdfense.com/cve-2025-53149-windows-ksthunk-heap-overflow/"],"published_time":"2025-08-12T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53152","summary":"Use after free in Desktop Windows Manager allows an authorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22336,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53152"],"published_time":"2025-08-12T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53153","summary":"Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00274,"ranking_epss":0.50892,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53153"],"published_time":"2025-08-12T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53140","summary":"Use after free in Kernel Transaction Manager allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00051,"ranking_epss":0.15822,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53140"],"published_time":"2025-08-12T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53141","summary":"Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00077,"ranking_epss":0.22898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53141"],"published_time":"2025-08-12T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53143","summary":"Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0235,"ranking_epss":0.84921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53143"],"published_time":"2025-08-12T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53144","summary":"Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0312,"ranking_epss":0.86862,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53144"],"published_time":"2025-08-12T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53145","summary":"Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0312,"ranking_epss":0.86862,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53145"],"published_time":"2025-08-12T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53134","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22407,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53134"],"published_time":"2025-08-12T18:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53136","summary":"Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00064,"ranking_epss":0.19975,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53136"],"published_time":"2025-08-12T18:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53137","summary":"Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.207,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53137"],"published_time":"2025-08-12T18:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53138","summary":"Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00359,"ranking_epss":0.58168,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53138"],"published_time":"2025-08-12T18:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50173","summary":"Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.39299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50173"],"published_time":"2025-08-12T18:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50177","summary":"Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00163,"ranking_epss":0.37245,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50177"],"published_time":"2025-08-12T18:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-53132","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00075,"ranking_epss":0.22572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53132"],"published_time":"2025-08-12T18:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50166","summary":"Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00259,"ranking_epss":0.49297,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50166"],"published_time":"2025-08-12T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50160","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00107,"ranking_epss":0.28933,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50160"],"published_time":"2025-08-12T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50161","summary":"Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00095,"ranking_epss":0.26311,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50161"],"published_time":"2025-08-12T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50162","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00107,"ranking_epss":0.28933,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50162"],"published_time":"2025-08-12T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50163","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00108,"ranking_epss":0.2906,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50163"],"published_time":"2025-08-12T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50164","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00107,"ranking_epss":0.28933,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50164"],"published_time":"2025-08-12T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50154","summary":"Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.15898,"ranking_epss":0.94764,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50154","https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/","https://github.com/rubenformation/CVE-2025-50154/","https://www.vicarius.io/vsociety/posts/cve-2025-50154-detection-script-zero-click-windows-file-explorer-spoofing-vulnerability","https://www.vicarius.io/vsociety/posts/cve-2025-50154-mitigation-script-zero-click-windows-file-explorer-spoofing-vulnerability"],"published_time":"2025-08-12T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50156","summary":"Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00359,"ranking_epss":0.58168,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50156"],"published_time":"2025-08-12T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50157","summary":"Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00359,"ranking_epss":0.58168,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50157"],"published_time":"2025-08-12T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50158","summary":"Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00058,"ranking_epss":0.18132,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50158"],"published_time":"2025-08-12T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49757","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00108,"ranking_epss":0.2906,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49757"],"published_time":"2025-08-12T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49761","summary":"Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00097,"ranking_epss":0.26655,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49761"],"published_time":"2025-08-12T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49762","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00054,"ranking_epss":0.16873,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49762"],"published_time":"2025-08-12T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-50153","summary":"Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00097,"ranking_epss":0.26655,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50153"],"published_time":"2025-08-12T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49743","summary":"Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.20835,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49743"],"published_time":"2025-08-12T18:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49742","summary":"Integer overflow or wraparound in Microsoft Graphics Component allows an authorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00473,"ranking_epss":0.64758,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49742"],"published_time":"2025-07-08T17:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49753","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49753"],"published_time":"2025-07-08T17:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49729","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49729"],"published_time":"2025-07-08T17:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49730","summary":"Time-of-check time-of-use (toctou) race condition in Microsoft Windows QoS scheduler allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02185,"ranking_epss":0.84389,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49730"],"published_time":"2025-07-08T17:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49732","summary":"Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.5712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49732"],"published_time":"2025-07-08T17:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49727","summary":"Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.3073,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49727"],"published_time":"2025-07-08T17:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49721","summary":"Heap-based buffer overflow in Windows Fast FAT Driver allows an unauthorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00247,"ranking_epss":0.48003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49721"],"published_time":"2025-07-08T17:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49722","summary":"Uncontrolled resource consumption in Windows Print Spooler Components allows an authorized attacker to deny service over an adjacent network.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.00869,"ranking_epss":0.75225,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49722"],"published_time":"2025-07-08T17:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49716","summary":"Uncontrolled resource consumption in Windows Netlogon allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.23017,"ranking_epss":0.95926,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49716"],"published_time":"2025-07-08T17:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49686","summary":"Null pointer dereference in Windows TCP/IP allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00468,"ranking_epss":0.64529,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49686"],"published_time":"2025-07-08T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49689","summary":"Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00312,"ranking_epss":0.54454,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49689"],"published_time":"2025-07-08T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49681","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00485,"ranking_epss":0.65409,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49681"],"published_time":"2025-07-08T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49683","summary":"Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01063,"ranking_epss":0.77696,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49683"],"published_time":"2025-07-08T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49676","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49676"],"published_time":"2025-07-08T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49678","summary":"Null pointer dereference in Windows NTFS allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00124,"ranking_epss":0.31664,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49678"],"published_time":"2025-07-08T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49679","summary":"Numeric truncation error in Windows Shell allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00523,"ranking_epss":0.66956,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49679"],"published_time":"2025-07-08T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49672","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49672"],"published_time":"2025-07-08T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49673","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49673"],"published_time":"2025-07-08T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49674","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49674"],"published_time":"2025-07-08T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49675","summary":"Use after free in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.5712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49675"],"published_time":"2025-07-08T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49667","summary":"Double free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00415,"ranking_epss":0.61717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49667"],"published_time":"2025-07-08T17:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49668","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49668"],"published_time":"2025-07-08T17:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49669","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49669"],"published_time":"2025-07-08T17:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49670","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00485,"ranking_epss":0.65409,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49670"],"published_time":"2025-07-08T17:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49671","summary":"Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00639,"ranking_epss":0.70584,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49671"],"published_time":"2025-07-08T17:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49663","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49663"],"published_time":"2025-07-08T17:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49664","summary":"Exposure of sensitive information to an unauthorized actor in Windows User-Mode Driver Framework Host allows an authorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00607,"ranking_epss":0.69724,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49664"],"published_time":"2025-07-08T17:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49658","summary":"Out-of-bounds read in Windows TDX.sys allows an authorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00327,"ranking_epss":0.55671,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49658"],"published_time":"2025-07-08T17:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49659","summary":"Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.5712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49659"],"published_time":"2025-07-08T17:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49661","summary":"Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.5712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49661"],"published_time":"2025-07-08T17:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-48821","summary":"Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over an adjacent network.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00164,"ranking_epss":0.37327,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48821"],"published_time":"2025-07-08T17:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-48824","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48824"],"published_time":"2025-07-08T17:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-49657","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49657"],"published_time":"2025-07-08T17:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-48819","summary":"Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over an adjacent network.","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00172,"ranking_epss":0.38551,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48819"],"published_time":"2025-07-08T17:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-48814","summary":"Missing authentication for critical function in Windows Remote Desktop Licensing Service allows an unauthorized attacker to bypass a security feature over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00921,"ranking_epss":0.76007,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48814"],"published_time":"2025-07-08T17:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-48815","summary":"Access of resource using incompatible type ('type confusion') in Windows SSDP Service allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00523,"ranking_epss":0.66956,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48815"],"published_time":"2025-07-08T17:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-48816","summary":"Integer overflow or wraparound in HID class driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00473,"ranking_epss":0.64758,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48816"],"published_time":"2025-07-08T17:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-48817","summary":"Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00199,"ranking_epss":0.41985,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48817"],"published_time":"2025-07-08T17:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-48808","summary":"Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00607,"ranking_epss":0.69724,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48808"],"published_time":"2025-07-08T17:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-48805","summary":"Heap-based buffer overflow in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.5712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48805"],"published_time":"2025-07-08T17:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-48806","summary":"Use after free in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.5712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48806"],"published_time":"2025-07-08T17:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47996","summary":"Integer underflow (wrap or wraparound) in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00473,"ranking_epss":0.64758,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47996"],"published_time":"2025-07-08T17:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47998","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00252,"ranking_epss":0.48548,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47998"],"published_time":"2025-07-08T17:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47987","summary":"Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00499,"ranking_epss":0.65973,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47987"],"published_time":"2025-07-08T17:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47984","summary":"Protection mechanism failure in Windows GDI allows an unauthorized attacker to disclose information over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02428,"ranking_epss":0.8517,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47984"],"published_time":"2025-07-08T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47985","summary":"Untrusted pointer dereference in Windows Event Tracing allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.5712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47985"],"published_time":"2025-07-08T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47986","summary":"Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00255,"ranking_epss":0.48866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47986"],"published_time":"2025-07-08T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47980","summary":"Exposure of sensitive information to an unauthorized actor in Windows Imaging Component allows an unauthorized attacker to disclose information locally.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00612,"ranking_epss":0.69872,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47980"],"published_time":"2025-07-08T17:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47981","summary":"Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network.","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02038,"ranking_epss":0.83855,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47981","https://www.vicarius.io/vsociety/posts/cve-2025-47981-detection-script-heap-based-buffer-overflow-in-windows-spnego-extended-negotiation","https://www.vicarius.io/vsociety/posts/cve-2025-47981-mitigation-script-heap-based-buffer-overflow-in-windows-spnego-extended-negotiation"],"published_time":"2025-07-08T17:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47971","summary":"Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00247,"ranking_epss":0.48003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47971"],"published_time":"2025-07-08T17:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47973","summary":"Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00247,"ranking_epss":0.48003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47973"],"published_time":"2025-07-08T17:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47975","summary":"Double free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00118,"ranking_epss":0.3073,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47975"],"published_time":"2025-07-08T17:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47976","summary":"Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.5712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47976"],"published_time":"2025-07-08T17:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-47955","summary":"Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00554,"ranking_epss":0.68125,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47955"],"published_time":"2025-06-10T17:24:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33075","summary":"Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01168,"ranking_epss":0.7867,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33075"],"published_time":"2025-06-10T17:23:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33073","summary":"Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.4924,"ranking_epss":0.9779,"kev":true,"propose_action":"Microsoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073","https://www.vicarius.io/vsociety/posts/cve-2025-33073-detection-script-improper-access-control-in-windows-smb-affects-microsoft-products","https://www.vicarius.io/vsociety/posts/cve-2025-33073-mitigation-script-improper-access-control-in-windows-smb-affects-microsoft-products","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-33073"],"published_time":"2025-06-10T17:23:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33070","summary":"Use of uninitialized resource in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00926,"ranking_epss":0.76083,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33070"],"published_time":"2025-06-10T17:22:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33066","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01338,"ranking_epss":0.8003,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33066"],"published_time":"2025-06-10T17:22:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33064","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01988,"ranking_epss":0.83636,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33064"],"published_time":"2025-06-10T17:22:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33057","summary":"Null pointer dereference in Windows Local Security Authority (LSA) allows an authorized attacker to deny service over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.06983,"ranking_epss":0.91475,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33057"],"published_time":"2025-06-10T17:22:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33056","summary":"Improper access control in Microsoft Local Security Authority Server (lsasrv) allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03776,"ranking_epss":0.88067,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33056"],"published_time":"2025-06-10T17:22:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-33053","summary":"External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.50282,"ranking_epss":0.97849,"kev":true,"propose_action":"Microsoft Windows contains an external control of file name or path vulnerability that could allow an attacker to execute code from a remote WebDAV location specified by the WorkingDirectory attribute of Internet Shortcut files.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053","https://research.checkpoint.com/2025/stealth-falcon-zero-day/","https://therecord.media/microsoft-cisa-zero-day-turkish-defense-org","https://www.bleepingcomputer.com/news/security/stealth-falcon-hackers-exploited-windows-webdav-zero-day-to-drop-malware/","https://www.darkreading.com/vulnerabilities-threats/stealth-falcon-apt-exploits-microsoft-rce-zero-day-mideast","https://www.theregister.com/2025/06/10/microsoft_patch_tuesday_june/","https://www.vicarius.io/vsociety/posts/cve-2025-33053-detection-script-remote-code-execution-vulnerability-in-microsoft-webdav","https://www.vicarius.io/vsociety/posts/cve-2025-33053-mitigation-script-remote-code-execution-vulnerability-in-microsoft-webdav","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-33053"],"published_time":"2025-06-10T17:22:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32724","summary":"Uncontrolled resource consumption in Windows Local Security Authority Subsystem Service (LSASS) allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.46168,"ranking_epss":0.97651,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32724"],"published_time":"2025-06-10T17:22:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32716","summary":"Out-of-bounds read in Windows Media allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00736,"ranking_epss":0.72872,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32716"],"published_time":"2025-06-10T17:21:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32715","summary":"Out-of-bounds read in Remote Desktop Client allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02066,"ranking_epss":0.83954,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32715"],"published_time":"2025-06-10T17:21:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32714","summary":"Improper access control in Windows Installer allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00635,"ranking_epss":0.70443,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32714"],"published_time":"2025-06-10T17:21:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32713","summary":"Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00736,"ranking_epss":0.72872,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32713"],"published_time":"2025-06-10T17:21:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32712","summary":"Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00736,"ranking_epss":0.72872,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32712"],"published_time":"2025-06-10T17:21:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32710","summary":"Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00714,"ranking_epss":0.72373,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710"],"published_time":"2025-06-10T17:21:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32709","summary":"Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00584,"ranking_epss":0.69064,"kev":true,"propose_action":"Microsoft Windows Ancillary Function Driver for WinSock contains a use-after-free vulnerability that allows an authorized attacker to escalate privileges to administrator.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32709"],"published_time":"2025-05-13T17:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32706","summary":"Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.013,"ranking_epss":0.79751,"kev":true,"propose_action":"Microsoft Windows Common Log File System (CLFS) Driver contains a heap-based buffer overflow vulnerability that allows an authorized attacker to elevate privileges locally.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706","https://www.vicarius.io/vsociety/posts/cve-2025-32706-detection-script-elevation-of-privilege-vulnerability-in-microsoft-windows-common-log-file-system-driver","https://www.vicarius.io/vsociety/posts/cve-2025-32706-mitigation-script-elevation-of-privilege-vulnerability-in-microsoft-windows-common-log-file-system-driver","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32706"],"published_time":"2025-05-13T17:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32707","summary":"Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00673,"ranking_epss":0.7143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707"],"published_time":"2025-05-13T17:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30397","summary":"Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.21265,"ranking_epss":0.95692,"kev":true,"propose_action":"Microsoft Windows Scripting Engine contains a type confusion vulnerability that allows an unauthorized attacker to execute code over a network via a specially crafted URL.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397","https://www.vicarius.io/vsociety/posts/cve-2025-30397-type-confusion-vulnerability-in-microsoft-scripting-engine-detection-script","https://www.vicarius.io/vsociety/posts/cve-2025-30397-type-confusion-vulnerability-in-microsoft-scripting-engine-mitigation-script","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-30397"],"published_time":"2025-05-13T17:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-32701","summary":"Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01544,"ranking_epss":0.81427,"kev":true,"propose_action":"Microsoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32701"],"published_time":"2025-05-13T17:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30385","summary":"Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0082,"ranking_epss":0.74429,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385"],"published_time":"2025-05-13T17:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-30388","summary":"Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00818,"ranking_epss":0.74408,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388"],"published_time":"2025-05-13T17:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29974","summary":"Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network.","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.01098,"ranking_epss":0.7805,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29974"],"published_time":"2025-05-13T17:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29966","summary":"Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02619,"ranking_epss":0.85685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29966"],"published_time":"2025-05-13T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29967","summary":"Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02619,"ranking_epss":0.85685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29967"],"published_time":"2025-05-13T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29968","summary":"Improper input validation in Active Directory Certificate Services (AD CS) allows an authorized attacker to deny service over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.06314,"ranking_epss":0.90993,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29968"],"published_time":"2025-05-13T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29969","summary":"Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0034,"ranking_epss":0.5677,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29969"],"published_time":"2025-05-13T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29959","summary":"Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0464,"ranking_epss":0.89303,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29959"],"published_time":"2025-05-13T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29960","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02343,"ranking_epss":0.84898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29960"],"published_time":"2025-05-13T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29961","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02343,"ranking_epss":0.84898,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29961"],"published_time":"2025-05-13T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29962","summary":"Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01674,"ranking_epss":0.82184,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29962"],"published_time":"2025-05-13T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29954","summary":"Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00608,"ranking_epss":0.69756,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29954"],"published_time":"2025-05-13T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29956","summary":"Buffer over-read in Windows SMB allows an authorized attacker to disclose information over a network.","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00453,"ranking_epss":0.638,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29956"],"published_time":"2025-05-13T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29957","summary":"Uncontrolled resource consumption in Windows Deployment Services allows an unauthorized attacker to deny service locally.","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.01067,"ranking_epss":0.77743,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29957"],"published_time":"2025-05-13T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29958","summary":"Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0464,"ranking_epss":0.89303,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29958"],"published_time":"2025-05-13T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29836","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01738,"ranking_epss":0.82527,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29836"],"published_time":"2025-05-13T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29837","summary":"Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.01404,"ranking_epss":0.80478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29837"],"published_time":"2025-05-13T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29839","summary":"Out-of-bounds read in Windows File Server allows an unauthorized attacker to disclose information locally.","cvss":4.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.0,"cvss_v4":null,"epss":0.01007,"ranking_epss":0.77094,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29839"],"published_time":"2025-05-13T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29830","summary":"Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03471,"ranking_epss":0.87563,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830"],"published_time":"2025-05-13T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29831","summary":"Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00695,"ranking_epss":0.71942,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29831"],"published_time":"2025-05-13T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29832","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01738,"ranking_epss":0.82527,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832"],"published_time":"2025-05-13T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29835","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01729,"ranking_epss":0.82483,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29835"],"published_time":"2025-05-13T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24063","summary":"Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00939,"ranking_epss":0.76261,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24063"],"published_time":"2025-05-13T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29824","summary":"Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00392,"ranking_epss":0.60238,"kev":true,"propose_action":"Microsoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.","ransomware_campaign":"Known","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824","https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-detection-script","https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-mitigation-script","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-29824"],"published_time":"2025-04-08T18:16:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-29810","summary":"Improper access control in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30289,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29810"],"published_time":"2025-04-08T18:16:06","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27742","summary":"Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00773,"ranking_epss":0.73631,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27742"],"published_time":"2025-04-08T18:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27737","summary":"Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally.","cvss":8.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.6,"cvss_v4":null,"epss":0.00834,"ranking_epss":0.74644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27737"],"published_time":"2025-04-08T18:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27740","summary":"Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01708,"ranking_epss":0.82361,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27740"],"published_time":"2025-04-08T18:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27741","summary":"Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00742,"ranking_epss":0.73011,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27741"],"published_time":"2025-04-08T18:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27732","summary":"Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00191,"ranking_epss":0.4109,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732"],"published_time":"2025-04-08T18:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27733","summary":"Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00742,"ranking_epss":0.73011,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27733"],"published_time":"2025-04-08T18:16:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27727","summary":"Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01099,"ranking_epss":0.7806,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727"],"published_time":"2025-04-08T18:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27484","summary":"Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00345,"ranking_epss":0.57129,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27484"],"published_time":"2025-04-08T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27487","summary":"Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00723,"ranking_epss":0.72571,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27487"],"published_time":"2025-04-08T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27478","summary":"Heap-based buffer overflow in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00182,"ranking_epss":0.39954,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27478"],"published_time":"2025-04-08T18:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27481","summary":"Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01103,"ranking_epss":0.78102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27481"],"published_time":"2025-04-08T18:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27473","summary":"Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.42371,"ranking_epss":0.97466,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27473"],"published_time":"2025-04-08T18:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27474","summary":"Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.04082,"ranking_epss":0.88575,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27474"],"published_time":"2025-04-08T18:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27477","summary":"Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03513,"ranking_epss":0.87644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27477"],"published_time":"2025-04-08T18:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27469","summary":"Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.42371,"ranking_epss":0.97466,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27469"],"published_time":"2025-04-08T18:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-27471","summary":"Sensitive data storage in improperly locked memory in Microsoft Streaming Service allows an unauthorized attacker to deny service over a network.","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00501,"ranking_epss":0.66031,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27471"],"published_time":"2025-04-08T18:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26686","summary":"Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00402,"ranking_epss":0.60881,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26686"],"published_time":"2025-04-08T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26687","summary":"Use after free in Windows Win32K - GRFX allows an unauthorized attacker to elevate privileges over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00463,"ranking_epss":0.64285,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26687"],"published_time":"2025-04-08T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26676","summary":"Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03036,"ranking_epss":0.86687,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26676"],"published_time":"2025-04-08T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26679","summary":"Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00693,"ranking_epss":0.71881,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26679"],"published_time":"2025-04-08T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26671","summary":"Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00428,"ranking_epss":0.62505,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26671"],"published_time":"2025-04-08T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26672","summary":"Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03036,"ranking_epss":0.86687,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26672"],"published_time":"2025-04-08T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26673","summary":"Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.44121,"ranking_epss":0.97555,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26673"],"published_time":"2025-04-08T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26667","summary":"Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.05089,"ranking_epss":0.89826,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26667"],"published_time":"2025-04-08T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26668","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00463,"ranking_epss":0.64285,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26668"],"published_time":"2025-04-08T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26669","summary":"Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01491,"ranking_epss":0.81098,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26669"],"published_time":"2025-04-08T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26670","summary":"Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0057,"ranking_epss":0.6866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26670"],"published_time":"2025-04-08T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26663","summary":"Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00553,"ranking_epss":0.6808,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26663"],"published_time":"2025-04-08T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26664","summary":"Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03036,"ranking_epss":0.86687,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26664"],"published_time":"2025-04-08T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26665","summary":"Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00191,"ranking_epss":0.4109,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26665"],"published_time":"2025-04-08T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26647","summary":"Improper input validation in Windows Kerberos allows an authorized attacker to elevate privileges over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0259,"ranking_epss":0.85616,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26647"],"published_time":"2025-04-08T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26648","summary":"Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00537,"ranking_epss":0.67559,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26648"],"published_time":"2025-04-08T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26641","summary":"Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.42371,"ranking_epss":0.97466,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26641"],"published_time":"2025-04-08T18:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21197","summary":"Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02389,"ranking_epss":0.85042,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21197"],"published_time":"2025-04-08T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21203","summary":"Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02258,"ranking_epss":0.84631,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21203"],"published_time":"2025-04-08T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21204","summary":"Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.07251,"ranking_epss":0.91647,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204","https://www.vicarius.io/vsociety/posts/cve-2025-21204-privilege-elevation-vulnerability-in-microsoft-windows-update-stack-detection-script","https://www.vicarius.io/vsociety/posts/cve-2025-21204-privilege-elevation-vulnerability-in-microsoft-windows-update-stack-mitigation-script"],"published_time":"2025-04-08T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21205","summary":"Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01103,"ranking_epss":0.78102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21205"],"published_time":"2025-04-08T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21221","summary":"Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01103,"ranking_epss":0.78102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21221"],"published_time":"2025-04-08T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21222","summary":"Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01103,"ranking_epss":0.78102,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21222"],"published_time":"2025-04-08T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21191","summary":"Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00191,"ranking_epss":0.4109,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21191"],"published_time":"2025-04-08T18:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26645","summary":"Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00311,"ranking_epss":0.54265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26645"],"published_time":"2025-03-11T17:16:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-26633","summary":"Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.19604,"ranking_epss":0.95427,"kev":true,"propose_action":"Microsoft Windows Management Console (MMC) contains an improper neutralization vulnerability that allows an unauthorized attacker to bypass a security feature locally.","ransomware_campaign":"Known","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633","https://www.vicarius.io/vsociety/posts/cve-2025-26633-security-feature-bypass-in-microsoft-management-console-detection-script","https://www.vicarius.io/vsociety/posts/cve-2025-26633-security-feature-bypass-in-microsoft-management-console-mitigation-script","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-26633"],"published_time":"2025-03-11T17:16:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24996","summary":"External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00773,"ranking_epss":0.73621,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24996"],"published_time":"2025-03-11T17:16:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24988","summary":"Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0036,"ranking_epss":0.58236,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24988"],"published_time":"2025-03-11T17:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24991","summary":"Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00525,"ranking_epss":0.67022,"kev":true,"propose_action":"Microsoft Windows New Technology File System (NTFS) contains an out-of-bounds read vulnerability that allows an authorized attacker to disclose information locally.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24991","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24991"],"published_time":"2025-03-11T17:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24992","summary":"Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally.","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00433,"ranking_epss":0.62784,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24992"],"published_time":"2025-03-11T17:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24993","summary":"Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00806,"ranking_epss":0.74212,"kev":true,"propose_action":"Microsoft Windows New Technology File System (NTFS) contains a heap-based buffer overflow vulnerability that allows an unauthorized attacker to execute code locally.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24993","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24993"],"published_time":"2025-03-11T17:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24985","summary":"Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00711,"ranking_epss":0.72301,"kev":true,"propose_action":"Microsoft Windows Fast FAT File System Driver contains an integer overflow or wraparound vulnerability that allows an unauthorized attacker to execute code locally.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24985","https://www.vicarius.io/vsociety/posts/cve-2025-24985-integer-overflow-vulnerability-in-microsoft-windows-fast-fat-driver-detection-script","https://www.vicarius.io/vsociety/posts/cve-2025-24985-integer-overflow-vulnerability-in-microsoft-windows-fast-fat-driver-mitigation-script","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24985"],"published_time":"2025-03-11T17:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24987","summary":"Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0036,"ranking_epss":0.58236,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24987"],"published_time":"2025-03-11T17:16:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24983","summary":"Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00567,"ranking_epss":0.68536,"kev":true,"propose_action":"Microsoft Windows Win32 Kernel Subsystem contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24983","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24983"],"published_time":"2025-03-11T17:16:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24072","summary":"Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00189,"ranking_epss":0.40724,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24072"],"published_time":"2025-03-11T17:16:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24064","summary":"Use after free in DNS Server allows an unauthorized attacker to execute code over a network.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00456,"ranking_epss":0.63916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24064"],"published_time":"2025-03-11T17:16:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24056","summary":"Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00491,"ranking_epss":0.65637,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24056"],"published_time":"2025-03-11T17:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24059","summary":"Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00283,"ranking_epss":0.51742,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24059"],"published_time":"2025-03-11T17:16:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24051","summary":"Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00516,"ranking_epss":0.66678,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24051"],"published_time":"2025-03-11T17:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24054","summary":"External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.11927,"ranking_epss":0.93778,"kev":true,"propose_action":"Microsoft Windows NTLM contains an external control of file name or path vulnerability that allows an unauthorized attacker to perform spoofing over a network.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054","http://seclists.org/fulldisclosure/2025/Apr/28","https://www.exploit-db.com/exploits/52478","https://www.exploit-db.com/exploits/52480","https://www.vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-detection-script","https://www.vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-mitigation-script","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24054"],"published_time":"2025-03-11T17:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24055","summary":"Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00276,"ranking_epss":0.51109,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24055"],"published_time":"2025-03-11T17:16:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-24035","summary":"Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00478,"ranking_epss":0.65039,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24035"],"published_time":"2025-03-11T17:16:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21247","summary":"Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.0053,"ranking_epss":0.6728,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21247"],"published_time":"2025-03-11T17:16:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21180","summary":"Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally.","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00528,"ranking_epss":0.67204,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21180"],"published_time":"2025-03-11T17:16:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21418","summary":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.1327,"ranking_epss":0.9418,"kev":true,"propose_action":"Microsoft Windows Ancillary Function Driver for WinSock contains a heap-based buffer overflow vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-21418"],"published_time":"2025-02-11T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21419","summary":"Windows Setup Files Cleanup Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00205,"ranking_epss":0.42702,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21419"],"published_time":"2025-02-11T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21407","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.37556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21407"],"published_time":"2025-02-11T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21410","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.37556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21410"],"published_time":"2025-02-11T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21406","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.37556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21406"],"published_time":"2025-02-11T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21376","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01292,"ranking_epss":0.79697,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21376"],"published_time":"2025-02-11T18:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21377","summary":"NTLM Hash Disclosure Spoofing Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03798,"ranking_epss":0.88096,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21377"],"published_time":"2025-02-11T18:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21368","summary":"Microsoft Digest Authentication Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00307,"ranking_epss":0.53928,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21368"],"published_time":"2025-02-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21369","summary":"Microsoft Digest Authentication Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00335,"ranking_epss":0.56384,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21369"],"published_time":"2025-02-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21371","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45828,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21371","https://www.vicarius.io/vsociety/posts/windows-telephony-service-remote-code-execution-vulnerability-detection-script","https://www.vicarius.io/vsociety/posts/windows-telephony-service-remote-code-execution-vulnerability-mitigation-script"],"published_time":"2025-02-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21373","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00163,"ranking_epss":0.37191,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21373"],"published_time":"2025-02-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21375","summary":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00163,"ranking_epss":0.37211,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21375"],"published_time":"2025-02-11T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21352","summary":"Internet Connection Sharing (ICS) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00451,"ranking_epss":0.63726,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21352"],"published_time":"2025-02-11T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21359","summary":"Windows Kernel Security Feature Bypass Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00111,"ranking_epss":0.29502,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21359"],"published_time":"2025-02-11T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21337","summary":"Windows NTFS Elevation of Privilege Vulnerability","cvss":3.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":3.3,"cvss_v4":null,"epss":0.00116,"ranking_epss":0.30262,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21337"],"published_time":"2025-02-11T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21350","summary":"Windows Kerberos Denial of Service Vulnerability","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.02127,"ranking_epss":0.84184,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21350"],"published_time":"2025-02-11T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21200","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.37556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21200"],"published_time":"2025-02-11T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21201","summary":"Windows Telephony Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.37556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21201"],"published_time":"2025-02-11T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21208","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.003,"ranking_epss":0.53349,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21208"],"published_time":"2025-02-11T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21190","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00165,"ranking_epss":0.37556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21190"],"published_time":"2025-02-11T18:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21181","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.13583,"ranking_epss":0.94254,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21181","https://www.vicarius.io/vsociety/posts/cve-2025-21181-denial-of-service-vulnerability-in-microsoft-message-queuing-detection-script","https://www.vicarius.io/vsociety/posts/cve-2025-21181-denial-of-service-vulnerability-in-microsoft-message-queuing-mitigation-script"],"published_time":"2025-02-11T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21413","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06103,"ranking_epss":0.90806,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21413"],"published_time":"2025-01-14T18:16:05","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21417","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06103,"ranking_epss":0.90806,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21417"],"published_time":"2025-01-14T18:16:05","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21409","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06103,"ranking_epss":0.90806,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21409"],"published_time":"2025-01-14T18:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21411","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06103,"ranking_epss":0.90806,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21411"],"published_time":"2025-01-14T18:16:04","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21389","summary":"Uncontrolled resource consumption in Windows Universal Plug and Play (UPnP) Device Host allows an unauthorized attacker to deny service over a network.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02393,"ranking_epss":0.8506,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21389"],"published_time":"2025-01-14T18:16:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21336","summary":"Windows Cryptographic Information Disclosure Vulnerability","cvss":5.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.6,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.28556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21336"],"published_time":"2025-01-14T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21338","summary":"GDI+ Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00532,"ranking_epss":0.67364,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21338"],"published_time":"2025-01-14T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21339","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06103,"ranking_epss":0.90806,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21339"],"published_time":"2025-01-14T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21341","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00208,"ranking_epss":0.43201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21341"],"published_time":"2025-01-14T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21331","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00451,"ranking_epss":0.63741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21331"],"published_time":"2025-01-14T18:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21332","summary":"MapUrlToZone Security Feature Bypass Vulnerability","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.3217,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21332"],"published_time":"2025-01-14T18:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21327","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00208,"ranking_epss":0.43201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21327"],"published_time":"2025-01-14T18:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21328","summary":"MapUrlToZone Security Feature Bypass Vulnerability","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00107,"ranking_epss":0.28835,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21328"],"published_time":"2025-01-14T18:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21329","summary":"MapUrlToZone Security Feature Bypass Vulnerability","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.28588,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21329"],"published_time":"2025-01-14T18:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21319","summary":"Windows Kernel Memory Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00158,"ranking_epss":0.36585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21319"],"published_time":"2025-01-14T18:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21320","summary":"Windows Kernel Memory Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00158,"ranking_epss":0.36585,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21320"],"published_time":"2025-01-14T18:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21324","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21324"],"published_time":"2025-01-14T18:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21310","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21310"],"published_time":"2025-01-14T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21303","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01224,"ranking_epss":0.79138,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21303"],"published_time":"2025-01-14T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21305","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01224,"ranking_epss":0.79138,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21305"],"published_time":"2025-01-14T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21306","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01654,"ranking_epss":0.82071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21306"],"published_time":"2025-01-14T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21307","summary":"Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.1077,"ranking_epss":0.93364,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307"],"published_time":"2025-01-14T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21298","summary":"Windows OLE Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.72219,"ranking_epss":0.98757,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298"],"published_time":"2025-01-14T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21300","summary":"Windows Universal Plug and Play (UPnP) Device Host Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01314,"ranking_epss":0.79866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21300"],"published_time":"2025-01-14T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21302","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01224,"ranking_epss":0.79138,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21302"],"published_time":"2025-01-14T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21294","summary":"Microsoft Digest Authentication Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.01892,"ranking_epss":0.83231,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21294"],"published_time":"2025-01-14T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21295","summary":"SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0171,"ranking_epss":0.82369,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21295"],"published_time":"2025-01-14T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21296","summary":"BranchCache Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00283,"ranking_epss":0.51772,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21296"],"published_time":"2025-01-14T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21297","summary":"Windows Remote Desktop Services Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0171,"ranking_epss":0.82369,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21297"],"published_time":"2025-01-14T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21288","summary":"Windows COM Server Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00184,"ranking_epss":0.40115,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21288"],"published_time":"2025-01-14T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21289","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01314,"ranking_epss":0.79866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21289"],"published_time":"2025-01-14T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21290","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01314,"ranking_epss":0.79866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21290"],"published_time":"2025-01-14T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21282","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01654,"ranking_epss":0.82071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21282"],"published_time":"2025-01-14T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21285","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.38795,"ranking_epss":0.97267,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21285"],"published_time":"2025-01-14T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21286","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03318,"ranking_epss":0.87284,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21286"],"published_time":"2025-01-14T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21287","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00217,"ranking_epss":0.44385,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21287"],"published_time":"2025-01-14T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21276","summary":"Windows MapUrlToZone Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06777,"ranking_epss":0.91332,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21276"],"published_time":"2025-01-14T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21277","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.30331,"ranking_epss":0.967,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21277"],"published_time":"2025-01-14T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21273","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01654,"ranking_epss":0.82071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21273"],"published_time":"2025-01-14T18:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21268","summary":"MapUrlToZone Security Feature Bypass Vulnerability","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00212,"ranking_epss":0.43808,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21268"],"published_time":"2025-01-14T18:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21269","summary":"Windows HTML Platforms Security Feature Bypass Vulnerability","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00171,"ranking_epss":0.38416,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21269"],"published_time":"2025-01-14T18:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21270","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01314,"ranking_epss":0.79866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21270"],"published_time":"2025-01-14T18:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21272","summary":"Windows COM Server Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00184,"ranking_epss":0.40115,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21272"],"published_time":"2025-01-14T18:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21261","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00188,"ranking_epss":0.40638,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21261"],"published_time":"2025-01-14T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21263","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00208,"ranking_epss":0.43201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21263"],"published_time":"2025-01-14T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21265","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00208,"ranking_epss":0.43201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21265"],"published_time":"2025-01-14T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21266","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01654,"ranking_epss":0.82071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21266"],"published_time":"2025-01-14T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21258","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21258"],"published_time":"2025-01-14T18:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21260","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21260"],"published_time":"2025-01-14T18:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21252","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01654,"ranking_epss":0.82071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21252"],"published_time":"2025-01-14T18:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21255","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21255"],"published_time":"2025-01-14T18:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21256","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21256"],"published_time":"2025-01-14T18:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21249","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43478,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21249"],"published_time":"2025-01-14T18:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21250","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00904,"ranking_epss":0.75757,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21250"],"published_time":"2025-01-14T18:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21251","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01314,"ranking_epss":0.79866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21251"],"published_time":"2025-01-14T18:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21245","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00667,"ranking_epss":0.71314,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21245"],"published_time":"2025-01-14T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21246","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00667,"ranking_epss":0.71314,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21246"],"published_time":"2025-01-14T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21243","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00718,"ranking_epss":0.72495,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21243"],"published_time":"2025-01-14T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21244","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00718,"ranking_epss":0.72495,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21244"],"published_time":"2025-01-14T18:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21242","summary":"Windows Kerberos Information Disclosure Vulnerability","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00249,"ranking_epss":0.48212,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21242"],"published_time":"2025-01-14T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21240","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00904,"ranking_epss":0.75757,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21240"],"published_time":"2025-01-14T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21238","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00667,"ranking_epss":0.71314,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21238"],"published_time":"2025-01-14T18:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21236","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00667,"ranking_epss":0.71314,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21236"],"published_time":"2025-01-14T18:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21237","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00667,"ranking_epss":0.71314,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21237"],"published_time":"2025-01-14T18:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21230","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01314,"ranking_epss":0.79866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21230"],"published_time":"2025-01-14T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21231","summary":"IP Helper Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01314,"ranking_epss":0.79866,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21231"],"published_time":"2025-01-14T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21232","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21232"],"published_time":"2025-01-14T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21233","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00667,"ranking_epss":0.71314,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21233"],"published_time":"2025-01-14T18:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21226","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21226"],"published_time":"2025-01-14T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21227","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21227"],"published_time":"2025-01-14T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21228","summary":"Windows Digital Media Elevation of Privilege Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40887,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21228"],"published_time":"2025-01-14T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21217","summary":"Windows NTLM Spoofing Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00575,"ranking_epss":0.68818,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21217"],"published_time":"2025-01-14T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21220","summary":"Microsoft Message Queuing Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01,"ranking_epss":0.77024,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21220"],"published_time":"2025-01-14T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21223","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00667,"ranking_epss":0.71314,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21223"],"published_time":"2025-01-14T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21210","summary":"Windows BitLocker Information Disclosure Vulnerability","cvss":4.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.2,"cvss_v4":null,"epss":0.00231,"ranking_epss":0.46021,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21210"],"published_time":"2025-01-14T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21214","summary":"Windows BitLocker Information Disclosure Vulnerability","cvss":4.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.2,"cvss_v4":null,"epss":0.0021,"ranking_epss":0.43475,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21214"],"published_time":"2025-01-14T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21215","summary":"Secure Boot Security Feature Bypass Vulnerability","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40855,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21215"],"published_time":"2025-01-14T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21189","summary":"MapUrlToZone Security Feature Bypass Vulnerability","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.00288,"ranking_epss":0.5235,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21189"],"published_time":"2025-01-14T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2025-21176","summary":".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01411,"ranking_epss":0.80533,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176","https://www.herodevs.com/vulnerability-directory/cve-2025-21176"],"published_time":"2025-01-14T18:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49138","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.84831,"ranking_epss":0.99347,"kev":true,"propose_action":"Microsoft Windows Common Log File System (CLFS) driver contains a heap-based buffer overflow vulnerability that allows a local attacker to escalate privileges.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49138","https://packetstorm.news/files/id/190585/","https://www.exploit-db.com/exploits/52270","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-49138"],"published_time":"2024-12-12T02:04:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49124","summary":"Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49124"],"published_time":"2024-12-12T02:04:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49125","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01882,"ranking_epss":0.83192,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49125"],"published_time":"2024-12-12T02:04:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49126","summary":"Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0054,"ranking_epss":0.67667,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49126"],"published_time":"2024-12-12T02:04:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49127","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.0054,"ranking_epss":0.67667,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49127"],"published_time":"2024-12-12T02:04:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49118","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00309,"ranking_epss":0.54097,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49118"],"published_time":"2024-12-12T02:04:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49121","summary":"Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.16507,"ranking_epss":0.94915,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49121"],"published_time":"2024-12-12T02:04:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49122","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.022,"ranking_epss":0.84444,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49122"],"published_time":"2024-12-12T02:04:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49112","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.81638,"ranking_epss":0.99189,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49112"],"published_time":"2024-12-12T02:04:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49113","summary":"Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.88639,"ranking_epss":0.99512,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49113"],"published_time":"2024-12-12T02:04:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49104","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0536,"ranking_epss":0.901,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49104"],"published_time":"2024-12-12T02:04:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49105","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":8.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.4,"cvss_v4":null,"epss":0.01448,"ranking_epss":0.80791,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49105"],"published_time":"2024-12-12T02:04:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49096","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05732,"ranking_epss":0.90459,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49096"],"published_time":"2024-12-12T02:04:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49102","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04123,"ranking_epss":0.88644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49102"],"published_time":"2024-12-12T02:04:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49089","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.0269,"ranking_epss":0.85886,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49089"],"published_time":"2024-12-12T02:04:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49090","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00262,"ranking_epss":0.49601,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49090"],"published_time":"2024-12-12T02:04:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49084","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31777,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49084"],"published_time":"2024-12-12T02:04:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49085","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0536,"ranking_epss":0.901,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49085"],"published_time":"2024-12-12T02:04:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49086","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04123,"ranking_epss":0.88644,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49086"],"published_time":"2024-12-12T02:04:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49088","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00262,"ranking_epss":0.49601,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49088"],"published_time":"2024-12-12T02:04:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49080","summary":"Windows IP Routing Management Snapin Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06607,"ranking_epss":0.91199,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49080"],"published_time":"2024-12-12T02:04:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49082","summary":"Windows File Explorer Information Disclosure Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.0011,"ranking_epss":0.29322,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49082"],"published_time":"2024-12-12T02:04:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49072","summary":"Windows Task Scheduler Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0022,"ranking_epss":0.44717,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49072"],"published_time":"2024-12-12T02:04:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49046","summary":"Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00245,"ranking_epss":0.47867,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49046"],"published_time":"2024-11-12T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-49019","summary":"Active Directory Certificate Services Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04703,"ranking_epss":0.89377,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49019"],"published_time":"2024-11-12T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43643","summary":"Windows USB Video Class System Driver Elevation of Privilege Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00223,"ranking_epss":0.45046,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43643"],"published_time":"2024-11-12T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43644","summary":"Windows Client-Side Caching Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00231,"ranking_epss":0.45997,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43644"],"published_time":"2024-11-12T18:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43638","summary":"Windows USB Video Class System Driver Elevation of Privilege Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00223,"ranking_epss":0.45046,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43638"],"published_time":"2024-11-12T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43641","summary":"Windows Registry Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00749,"ranking_epss":0.7318,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43641"],"published_time":"2024-11-12T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43634","summary":"Windows USB Video Class System Driver Elevation of Privilege Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00223,"ranking_epss":0.45046,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43634"],"published_time":"2024-11-12T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43635","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03059,"ranking_epss":0.8673,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43635"],"published_time":"2024-11-12T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43637","summary":"Windows USB Video Class System Driver Elevation of Privilege Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00223,"ranking_epss":0.45046,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43637"],"published_time":"2024-11-12T18:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43626","summary":"Windows Telephony Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00215,"ranking_epss":0.44052,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43626"],"published_time":"2024-11-12T18:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43627","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02871,"ranking_epss":0.86292,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43627"],"published_time":"2024-11-12T18:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43628","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03085,"ranking_epss":0.86799,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43628"],"published_time":"2024-11-12T18:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43620","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02871,"ranking_epss":0.86292,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43620"],"published_time":"2024-11-12T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43621","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02871,"ranking_epss":0.86292,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43621"],"published_time":"2024-11-12T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43622","summary":"Windows Telephony Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02871,"ranking_epss":0.86292,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43622"],"published_time":"2024-11-12T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43623","summary":"Windows NT OS Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.05353,"ranking_epss":0.90093,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43623"],"published_time":"2024-11-12T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43450","summary":"Windows DNS Spoofing Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01196,"ranking_epss":0.78907,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43450"],"published_time":"2024-11-12T18:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43451","summary":"NTLM Hash Disclosure Spoofing Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.90313,"ranking_epss":0.99601,"kev":true,"propose_action":"Microsoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43451","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-43451"],"published_time":"2024-11-12T18:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43452","summary":"Windows Registry Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04906,"ranking_epss":0.89618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43452"],"published_time":"2024-11-12T18:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43449","summary":"Windows USB Video Class System Driver Elevation of Privilege Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00223,"ranking_epss":0.45046,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449"],"published_time":"2024-11-12T18:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38203","summary":"Windows Package Library Manager Information Disclosure Vulnerability","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00089,"ranking_epss":0.25313,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38203"],"published_time":"2024-11-12T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43611","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08321,"ranking_epss":0.92293,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43611"],"published_time":"2024-10-08T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43607","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04164,"ranking_epss":0.88699,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43607"],"published_time":"2024-10-08T18:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43608","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04164,"ranking_epss":0.88699,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43608"],"published_time":"2024-10-08T18:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43592","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06354,"ranking_epss":0.91017,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43592"],"published_time":"2024-10-08T18:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43593","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06354,"ranking_epss":0.91017,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43593"],"published_time":"2024-10-08T18:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43599","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0413,"ranking_epss":0.88655,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43599"],"published_time":"2024-10-08T18:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43583","summary":"Winlogon Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04113,"ranking_epss":0.88624,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43583","https://github.com/Kvngtheta/CVE-2024-43583-PoC/blob/main/poc-43583.py"],"published_time":"2024-10-08T18:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43589","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0413,"ranking_epss":0.88655,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43589"],"published_time":"2024-10-08T18:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43570","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":6.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.4,"cvss_v4":null,"epss":0.00215,"ranking_epss":0.44024,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43570"],"published_time":"2024-10-08T18:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43572","summary":"Microsoft Management Console Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.50843,"ranking_epss":0.97872,"kev":true,"propose_action":"Microsoft Windows Management Console contains unspecified vulnerability that allows for remote code execution.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43572","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-43572"],"published_time":"2024-10-08T18:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43564","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04164,"ranking_epss":0.88699,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43564"],"published_time":"2024-10-08T18:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43553","summary":"NT OS Kernel Elevation of Privilege Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00463,"ranking_epss":0.64333,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43553"],"published_time":"2024-10-08T18:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43556","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00628,"ranking_epss":0.70299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43556"],"published_time":"2024-10-08T18:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43547","summary":"Windows Kerberos Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40889,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43547"],"published_time":"2024-10-08T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43549","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04164,"ranking_epss":0.88699,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43549"],"published_time":"2024-10-08T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43544","summary":"Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09955,"ranking_epss":0.93048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43544"],"published_time":"2024-10-08T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43545","summary":"Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09955,"ranking_epss":0.93048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43545"],"published_time":"2024-10-08T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43541","summary":"Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09955,"ranking_epss":0.93048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43541"],"published_time":"2024-10-08T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43532","summary":"Remote Registry Service Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.61411,"ranking_epss":0.98331,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43532"],"published_time":"2024-10-08T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43534","summary":"Windows Graphics Component Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00607,"ranking_epss":0.69726,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43534"],"published_time":"2024-10-08T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43535","summary":"Windows Kernel-Mode Driver Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00514,"ranking_epss":0.666,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43535"],"published_time":"2024-10-08T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43520","summary":"Windows Kernel Denial of Service Vulnerability","cvss":5.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.0,"cvss_v4":null,"epss":0.00449,"ranking_epss":0.63631,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43520"],"published_time":"2024-10-08T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43515","summary":"Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03216,"ranking_epss":0.87058,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43515"],"published_time":"2024-10-08T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43517","summary":"Microsoft ActiveX Data Objects Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08063,"ranking_epss":0.92143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43517"],"published_time":"2024-10-08T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43518","summary":"Windows Telephony Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08063,"ranking_epss":0.92143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43518"],"published_time":"2024-10-08T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43519","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.07097,"ranking_epss":0.91545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43519"],"published_time":"2024-10-08T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43509","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00628,"ranking_epss":0.70299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43509"],"published_time":"2024-10-08T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43506","summary":"BranchCache Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09955,"ranking_epss":0.93048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43506"],"published_time":"2024-10-08T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43501","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0071,"ranking_epss":0.7228,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43501"],"published_time":"2024-10-08T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43483","summary":".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00738,"ranking_epss":0.72894,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43483"],"published_time":"2024-10-08T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43484","summary":".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0121,"ranking_epss":0.79015,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43484","https://security.netapp.com/advisory/ntap-20250328-0007/"],"published_time":"2024-10-08T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43453","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05505,"ranking_epss":0.90251,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43453"],"published_time":"2024-10-08T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43456","summary":"Windows Remote Desktop Services Tampering Vulnerability","cvss":4.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.8,"cvss_v4":null,"epss":0.00367,"ranking_epss":0.58688,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43456"],"published_time":"2024-10-08T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38261","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01158,"ranking_epss":0.786,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38261"],"published_time":"2024-10-08T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38262","summary":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00402,"ranking_epss":0.60885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38262"],"published_time":"2024-10-08T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38265","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05513,"ranking_epss":0.90257,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38265"],"published_time":"2024-10-08T18:15:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38124","summary":"Windows Netlogon Elevation of Privilege Vulnerability","cvss":9.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.0,"cvss_v4":null,"epss":0.00331,"ranking_epss":0.56113,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38124"],"published_time":"2024-10-08T18:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38149","summary":"BranchCache Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.09955,"ranking_epss":0.93048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38149"],"published_time":"2024-10-08T18:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38212","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04164,"ranking_epss":0.88699,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38212"],"published_time":"2024-10-08T18:15:07","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43475","summary":"Microsoft Windows Admin Center Information Disclosure Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.08731,"ranking_epss":0.9251,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43475"],"published_time":"2024-09-10T17:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43467","summary":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.003,"ranking_epss":0.53367,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43467"],"published_time":"2024-09-10T17:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43461","summary":"Windows MSHTML Platform Spoofing Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.10842,"ranking_epss":0.9339,"kev":true,"propose_action":"Microsoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to spoof a web page. This vulnerability was exploited in conjunction with CVE-2024-38112.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-43461"],"published_time":"2024-09-10T17:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38260","summary":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03972,"ranking_epss":0.88396,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38260"],"published_time":"2024-09-10T17:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38263","summary":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00161,"ranking_epss":0.36971,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38263"],"published_time":"2024-09-10T17:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43454","summary":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.28831,"ranking_epss":0.96568,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43454"],"published_time":"2024-09-10T17:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-43455","summary":"Windows Remote Desktop Licensing Service Spoofing Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04798,"ranking_epss":0.89503,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455"],"published_time":"2024-09-10T17:15:32","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38256","summary":"Windows Kernel-Mode Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40843,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38256"],"published_time":"2024-09-10T17:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38258","summary":"Windows Remote Desktop Licensing Service Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00644,"ranking_epss":0.70716,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38258"],"published_time":"2024-09-10T17:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38249","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00626,"ranking_epss":0.70237,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38249"],"published_time":"2024-09-10T17:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38250","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00254,"ranking_epss":0.48764,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250"],"published_time":"2024-09-10T17:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38245","summary":"Kernel Streaming Service Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0059,"ranking_epss":0.69214,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38245"],"published_time":"2024-09-10T17:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38247","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00357,"ranking_epss":0.57992,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38247"],"published_time":"2024-09-10T17:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38236","summary":"DHCP Server Service Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.1003,"ranking_epss":0.93078,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38236"],"published_time":"2024-09-10T17:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38239","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.04068,"ranking_epss":0.8855,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38239"],"published_time":"2024-09-10T17:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38231","summary":"Windows Remote Desktop Licensing Service Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01915,"ranking_epss":0.83349,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231"],"published_time":"2024-09-10T17:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38234","summary":"Windows Networking Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00381,"ranking_epss":0.59555,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234"],"published_time":"2024-09-10T17:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38217","summary":"Windows Mark of the Web Security Feature Bypass Vulnerability","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.12116,"ranking_epss":0.9383,"kev":true,"propose_action":"Microsoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217","https://www.elastic.co/security-labs/dismantling-smart-app-control","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-38217"],"published_time":"2024-09-10T17:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38014","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.12828,"ranking_epss":0.94057,"kev":true,"propose_action":"Microsoft Windows Installer contains an improper privilege management vulnerability that could allow an attacker to gain SYSTEM privileges.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014","http://seclists.org/fulldisclosure/2024/Sep/43","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-38014"],"published_time":"2024-09-10T17:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30073","summary":"Windows Security Zone Mapping Security Feature Bypass Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00322,"ranking_epss":0.55343,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30073"],"published_time":"2024-09-10T17:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38223","summary":"Windows Initial Machine Configuration Elevation of Privilege Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00147,"ranking_epss":0.35202,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38223"],"published_time":"2024-08-13T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38214","summary":"Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00341,"ranking_epss":0.56881,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38214"],"published_time":"2024-08-13T18:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38198","summary":"Windows Print Spooler Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02517,"ranking_epss":0.85432,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38198"],"published_time":"2024-08-13T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38199","summary":"Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.04572,"ranking_epss":0.89223,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38199"],"published_time":"2024-08-13T18:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38193","summary":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.74832,"ranking_epss":0.98867,"kev":true,"propose_action":"Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193","https://www.exploit-db.com/exploits/52284","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-38193"],"published_time":"2024-08-13T18:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38196","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.08292,"ranking_epss":0.92264,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38196"],"published_time":"2024-08-13T18:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38191","summary":"Kernel Streaming Service Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.51902,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38191"],"published_time":"2024-08-13T18:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38180","summary":"Windows SmartScreen Security Feature Bypass Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06536,"ranking_epss":0.91148,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38180"],"published_time":"2024-08-13T18:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38154","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08063,"ranking_epss":0.92143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38154"],"published_time":"2024-08-13T18:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38151","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00259,"ranking_epss":0.49277,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38151"],"published_time":"2024-08-13T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38152","summary":"Windows OLE Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00962,"ranking_epss":0.76545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38152"],"published_time":"2024-08-13T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38153","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00138,"ranking_epss":0.33812,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38153"],"published_time":"2024-08-13T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38144","summary":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.79806,"ranking_epss":0.991,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38144"],"published_time":"2024-08-13T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38140","summary":"Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.05043,"ranking_epss":0.89778,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38140","https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2062"],"published_time":"2024-08-13T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38134","summary":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00628,"ranking_epss":0.70299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38134"],"published_time":"2024-08-13T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38130","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05934,"ranking_epss":0.90643,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38130"],"published_time":"2024-08-13T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38131","summary":"Clipboard Virtual Channel Extension Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01485,"ranking_epss":0.81061,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38131"],"published_time":"2024-08-13T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38125","summary":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.09427,"ranking_epss":0.92808,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38125"],"published_time":"2024-08-13T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38127","summary":"Windows Hyper-V Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.08077,"ranking_epss":0.92152,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38127"],"published_time":"2024-08-13T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38128","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.04783,"ranking_epss":0.89483,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38128"],"published_time":"2024-08-13T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38120","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06256,"ranking_epss":0.90938,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38120"],"published_time":"2024-08-13T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38121","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08063,"ranking_epss":0.92143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38121"],"published_time":"2024-08-13T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38122","summary":"Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00516,"ranking_epss":0.6673,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38122"],"published_time":"2024-08-13T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38115","summary":"Windows IP Routing Management Snapin Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08063,"ranking_epss":0.92143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38115"],"published_time":"2024-08-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38116","summary":"Windows IP Routing Management Snapin Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.11979,"ranking_epss":0.93793,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38116"],"published_time":"2024-08-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38117","summary":"NTFS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00628,"ranking_epss":0.70299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38117"],"published_time":"2024-08-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38118","summary":"Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00335,"ranking_epss":0.56362,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38118"],"published_time":"2024-08-13T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38114","summary":"Windows IP Routing Management Snapin Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.08063,"ranking_epss":0.92143,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38114"],"published_time":"2024-08-13T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38063","summary":"Windows TCP/IP Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.89875,"ranking_epss":0.99574,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063"],"published_time":"2024-08-13T18:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-29995","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.06141,"ranking_epss":0.90834,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29995"],"published_time":"2024-08-13T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-37968","summary":"Windows DNS Spoofing Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.08056,"ranking_epss":0.92138,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37968"],"published_time":"2024-08-13T18:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38104","summary":"Windows Fax Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.06746,"ranking_epss":0.91312,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38104","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38104"],"published_time":"2024-07-09T17:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38112","summary":"Windows MSHTML Platform Spoofing Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.92959,"ranking_epss":0.99779,"kev":true,"propose_action":"Microsoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-38112"],"published_time":"2024-07-09T17:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38099","summary":"Windows Remote Desktop Licensing Service Denial of Service Vulnerability","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.01417,"ranking_epss":0.80593,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38099","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38099"],"published_time":"2024-07-09T17:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38091","summary":"Microsoft WS-Discovery Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.11055,"ranking_epss":0.93469,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38091"],"published_time":"2024-07-09T17:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38085","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04328,"ranking_epss":0.88931,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38085"],"published_time":"2024-07-09T17:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38079","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00743,"ranking_epss":0.73062,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38079","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38079"],"published_time":"2024-07-09T17:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38081","summary":".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.008,"ranking_epss":0.74097,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38081"],"published_time":"2024-07-09T17:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38077","summary":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.86329,"ranking_epss":0.99408,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077"],"published_time":"2024-07-09T17:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38073","summary":"Windows Remote Desktop Licensing Service Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06449,"ranking_epss":0.91092,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38073","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38073"],"published_time":"2024-07-09T17:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38074","summary":"Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.08761,"ranking_epss":0.92522,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38074","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38074"],"published_time":"2024-07-09T17:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38071","summary":"Windows Remote Desktop Licensing Service Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.27072,"ranking_epss":0.96388,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38071","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38071"],"published_time":"2024-07-09T17:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38066","summary":"Windows Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00519,"ranking_epss":0.66815,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38066"],"published_time":"2024-07-09T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38067","summary":"Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06834,"ranking_epss":0.91368,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38067","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38067"],"published_time":"2024-07-09T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38068","summary":"Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05152,"ranking_epss":0.899,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38068","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38068"],"published_time":"2024-07-09T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38064","summary":"Windows TCP/IP Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.14538,"ranking_epss":0.94477,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38064","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38064"],"published_time":"2024-07-09T17:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38060","summary":"Windows Imaging Component Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.11773,"ranking_epss":0.93727,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38060","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38060"],"published_time":"2024-07-09T17:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38061","summary":"DCOM Remote Cross-Session Activation Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03075,"ranking_epss":0.86777,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38061","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38061"],"published_time":"2024-07-09T17:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38057","summary":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00683,"ranking_epss":0.71681,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38057","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38057"],"published_time":"2024-07-09T17:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38054","summary":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.3278,"ranking_epss":0.9689,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38054","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38054"],"published_time":"2024-07-09T17:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38055","summary":"Microsoft Windows Codecs Library Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00505,"ranking_epss":0.66242,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38055","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38055"],"published_time":"2024-07-09T17:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38051","summary":"Windows Graphics Component Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01894,"ranking_epss":0.83235,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38051","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38051"],"published_time":"2024-07-09T17:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38052","summary":"Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03212,"ranking_epss":0.87051,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38052","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38052"],"published_time":"2024-07-09T17:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38048","summary":"Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00203,"ranking_epss":0.42434,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38048","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38048"],"published_time":"2024-07-09T17:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38049","summary":"Windows Distributed Transaction Coordinator Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0037,"ranking_epss":0.58863,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38049","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38049"],"published_time":"2024-07-09T17:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38050","summary":"Windows Workstation Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00791,"ranking_epss":0.73934,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050"],"published_time":"2024-07-09T17:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38034","summary":"Windows Filtering Platform Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01449,"ranking_epss":0.80802,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38034","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38034"],"published_time":"2024-07-09T17:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38031","summary":"Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05152,"ranking_epss":0.899,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38031"],"published_time":"2024-07-09T17:15:30","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38025","summary":"Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.04769,"ranking_epss":0.89471,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38025","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38025"],"published_time":"2024-07-09T17:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38027","summary":"Windows Line Printer Daemon Service Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00376,"ranking_epss":0.59232,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38027"],"published_time":"2024-07-09T17:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38028","summary":"Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.03597,"ranking_epss":0.8778,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38028"],"published_time":"2024-07-09T17:15:29","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38017","summary":"Microsoft Message Queuing Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00597,"ranking_epss":0.69431,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38017","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38017"],"published_time":"2024-07-09T17:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-38019","summary":"Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.02807,"ranking_epss":0.8615,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019"],"published_time":"2024-07-09T17:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-35270","summary":"Windows iSCSI Service Denial of Service Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00476,"ranking_epss":0.64903,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35270","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35270"],"published_time":"2024-07-09T17:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30081","summary":"Windows NTLM Spoofing Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.0591,"ranking_epss":0.90621,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30081","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30081"],"published_time":"2024-07-09T17:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-35250","summary":"Windows Kernel-Mode Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.56833,"ranking_epss":0.98142,"kev":true,"propose_action":"Microsoft Windows Kernel-Mode Driver contains an untrusted pointer dereference vulnerability that allows a local attacker to escalate privileges.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-35250"],"published_time":"2024-06-11T17:16:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30095","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00972,"ranking_epss":0.76684,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30095","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30095"],"published_time":"2024-06-11T17:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30090","summary":"Microsoft Streaming Service Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.20925,"ranking_epss":0.95645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30090","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30090"],"published_time":"2024-06-11T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30091","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03525,"ranking_epss":0.87667,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30091","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30091"],"published_time":"2024-06-11T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30093","summary":"Windows Storage Elevation of Privilege Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00677,"ranking_epss":0.71547,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30093","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30093"],"published_time":"2024-06-11T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30094","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00962,"ranking_epss":0.76545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30094","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30094"],"published_time":"2024-06-11T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30087","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01912,"ranking_epss":0.83329,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30087","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30087"],"published_time":"2024-06-11T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30080","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.16703,"ranking_epss":0.94949,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30080","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30080","https://www.vicarius.io/vsociety/posts/cve-2024-30080-detection-script-remote-code-execution-vulnerability-affecting-microsoft-msmq-1","https://www.vicarius.io/vsociety/posts/cve-2024-30080-mitigation-script-remote-code-execution-vulnerability-affecting-microsoft-msmq"],"published_time":"2024-06-11T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30082","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00232,"ranking_epss":0.46109,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30082","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30082"],"published_time":"2024-06-11T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30084","summary":"Windows Kernel-Mode Driver Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00898,"ranking_epss":0.7568,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30084","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30084"],"published_time":"2024-06-11T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30074","summary":"Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00745,"ranking_epss":0.73096,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30074","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30074"],"published_time":"2024-06-11T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30075","summary":"Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00738,"ranking_epss":0.72892,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30075","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30075"],"published_time":"2024-06-11T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30077","summary":"Windows OLE Remote Code Execution Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.05619,"ranking_epss":0.90351,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30077","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30077"],"published_time":"2024-06-11T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30078","summary":"Windows Wi-Fi Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.25004,"ranking_epss":0.96181,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30078","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30078","https://www.vicarius.io/vsociety/posts/cve-2024-30078-detection-script-windows-wi-fi-driver-remote-code-execution-vulnerability","https://www.vicarius.io/vsociety/posts/cve-2024-30078-mitigation-script-windows-wi-fi-driver-remote-code-execution-vulnerability"],"published_time":"2024-06-11T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30063","summary":"Windows Distributed File System (DFS) Remote Code Execution Vulnerability","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00318,"ranking_epss":0.54892,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30063","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30063"],"published_time":"2024-06-11T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30050","summary":"Windows Mark of the Web Security Feature Bypass Vulnerability","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.09191,"ranking_epss":0.92712,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050"],"published_time":"2024-05-14T17:17:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30049","summary":"Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0064,"ranking_epss":0.70605,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049"],"published_time":"2024-05-14T17:17:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30039","summary":"Windows Remote Access Connection Manager Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00469,"ranking_epss":0.64557,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039"],"published_time":"2024-05-14T17:17:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30037","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.02531,"ranking_epss":0.85467,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037"],"published_time":"2024-05-14T17:17:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30036","summary":"Windows Deployment Services Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0717,"ranking_epss":0.91591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30036","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30036"],"published_time":"2024-05-14T17:17:08","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30031","summary":"Windows CNG Key Isolation Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00146,"ranking_epss":0.34972,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30031","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30031"],"published_time":"2024-05-14T17:17:03","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30030","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00589,"ranking_epss":0.69193,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30030","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30030"],"published_time":"2024-05-14T17:17:02","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30029","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01759,"ranking_epss":0.82634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30029","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30029"],"published_time":"2024-05-14T17:17:01","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30028","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00347,"ranking_epss":0.57361,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30028","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30028"],"published_time":"2024-05-14T17:17:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30027","summary":"NTFS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00344,"ranking_epss":0.57048,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30027","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30027"],"published_time":"2024-05-14T17:16:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30025","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03014,"ranking_epss":0.8662,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30025","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30025"],"published_time":"2024-05-14T17:16:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30024","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01776,"ranking_epss":0.82719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30024","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30024"],"published_time":"2024-05-14T17:16:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30023","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01776,"ranking_epss":0.82719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30023","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30023"],"published_time":"2024-05-14T17:16:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30022","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01776,"ranking_epss":0.82719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30022","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30022"],"published_time":"2024-05-14T17:16:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30020","summary":"Windows Cryptographic Services Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.04313,"ranking_epss":0.88909,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30020","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30020"],"published_time":"2024-05-14T17:16:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30019","summary":"DHCP Server Service Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01018,"ranking_epss":0.77239,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30019","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30019"],"published_time":"2024-05-14T17:16:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30016","summary":"Windows Cryptographic Services Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00254,"ranking_epss":0.48772,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30016","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30016"],"published_time":"2024-05-14T17:16:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30015","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01759,"ranking_epss":0.82634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30015","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30015"],"published_time":"2024-05-14T17:16:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30014","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01759,"ranking_epss":0.82634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30014","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30014"],"published_time":"2024-05-14T17:16:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30009","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0478,"ranking_epss":0.89481,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009"],"published_time":"2024-05-14T17:16:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-30006","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05419,"ranking_epss":0.90166,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006"],"published_time":"2024-05-14T17:16:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-29996","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03014,"ranking_epss":0.8662,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996"],"published_time":"2024-05-14T17:16:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-29066","summary":"Windows Distributed File System (DFS) Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.01157,"ranking_epss":0.78591,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29066","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29066"],"published_time":"2024-04-09T17:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-29056","summary":"Windows Authentication Elevation of Privilege Vulnerability","cvss":4.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.3,"cvss_v4":null,"epss":0.01412,"ranking_epss":0.8056,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056"],"published_time":"2024-04-09T17:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-29050","summary":"Windows Cryptographic Services Remote Code Execution Vulnerability","cvss":8.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.4,"cvss_v4":null,"epss":0.37876,"ranking_epss":0.97218,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29050","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29050"],"published_time":"2024-04-09T17:15:58","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-28925","summary":"Secure Boot Security Feature Bypass Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00636,"ranking_epss":0.70503,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28925","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28925"],"published_time":"2024-04-09T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26248","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04291,"ranking_epss":0.88874,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26248","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26248"],"published_time":"2024-04-09T17:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26252","summary":"Windows rndismp6.sys Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.0023,"ranking_epss":0.45843,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26252","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26252"],"published_time":"2024-04-09T17:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26253","summary":"Windows rndismp6.sys Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00337,"ranking_epss":0.56568,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26253","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26253"],"published_time":"2024-04-09T17:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26241","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00628,"ranking_epss":0.70299,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26241","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26241"],"published_time":"2024-04-09T17:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26242","summary":"Windows Telephony Server Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.51902,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26242","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26242"],"published_time":"2024-04-09T17:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26244","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.03201,"ranking_epss":0.87022,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26244","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26244"],"published_time":"2024-04-09T17:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26240","summary":"Secure Boot Security Feature Bypass Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00506,"ranking_epss":0.66273,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26240","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26240"],"published_time":"2024-04-09T17:15:44","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26230","summary":"Windows Telephony Server Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.42057,"ranking_epss":0.97449,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26230","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26230"],"published_time":"2024-04-09T17:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26232","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00831,"ranking_epss":0.7461,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26232","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26232"],"published_time":"2024-04-09T17:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26234","summary":"Proxy Driver Spoofing Vulnerability","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.02705,"ranking_epss":0.85915,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26234","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26234"],"published_time":"2024-04-09T17:15:43","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26226","summary":"Windows Distributed File System (DFS) Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.08211,"ranking_epss":0.9222,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26226","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26226"],"published_time":"2024-04-09T17:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26228","summary":"Windows Cryptographic Services Security Feature Bypass Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0031,"ranking_epss":0.54231,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26228","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26228"],"published_time":"2024-04-09T17:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26229","summary":"Windows CSC Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.83166,"ranking_epss":0.99265,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26229","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26229"],"published_time":"2024-04-09T17:15:42","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26214","summary":"Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02216,"ranking_epss":0.84504,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26214","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26214"],"published_time":"2024-04-09T17:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26215","summary":"DHCP Server Service Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.07584,"ranking_epss":0.91861,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26215","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26215"],"published_time":"2024-04-09T17:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26216","summary":"Windows File Server Resource Management Service Elevation of Privilege Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00664,"ranking_epss":0.71254,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26216","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26216"],"published_time":"2024-04-09T17:15:40","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26210","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0298,"ranking_epss":0.86545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26210","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26210"],"published_time":"2024-04-09T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26212","summary":"DHCP Server Service Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.53952,"ranking_epss":0.98015,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26212","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26212"],"published_time":"2024-04-09T17:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26205","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0298,"ranking_epss":0.86545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26205","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26205"],"published_time":"2024-04-09T17:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26208","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.03849,"ranking_epss":0.88208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26208","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26208"],"published_time":"2024-04-09T17:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26194","summary":"Secure Boot Security Feature Bypass Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00119,"ranking_epss":0.30834,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26194","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26194"],"published_time":"2024-04-09T17:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26195","summary":"DHCP Server Service Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.06406,"ranking_epss":0.91062,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26195","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26195"],"published_time":"2024-04-09T17:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26200","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0298,"ranking_epss":0.86545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26200","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26200"],"published_time":"2024-04-09T17:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26179","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0298,"ranking_epss":0.86545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26179","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26179"],"published_time":"2024-04-09T17:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26183","summary":"Windows Kerberos Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.14061,"ranking_epss":0.94372,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26183","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26183"],"published_time":"2024-04-09T17:15:36","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26158","summary":"Microsoft Install Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.10112,"ranking_epss":0.93114,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26158","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26158"],"published_time":"2024-04-09T17:15:35","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21409","summary":".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.54695,"ranking_epss":0.98044,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21409","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21409","https://security.netapp.com/advisory/ntap-20250117-0002/"],"published_time":"2024-04-09T17:15:34","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20678","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.07084,"ranking_epss":0.91539,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20678","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20678"],"published_time":"2024-04-09T17:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-29059","summary":".NET Framework Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.938,"ranking_epss":0.9986,"kev":true,"propose_action":"Microsoft .NET Framework contains an information disclosure vulnerability that exposes the ObjRef URI to an attacker, ultimately enabling remote code execution.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-29059"],"published_time":"2024-03-23T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26177","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00565,"ranking_epss":0.68482,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26177","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26177"],"published_time":"2024-03-12T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26178","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00141,"ranking_epss":0.34352,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26178","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26178"],"published_time":"2024-03-12T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26181","summary":"Windows Kernel Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00312,"ranking_epss":0.54388,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26181","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26181"],"published_time":"2024-03-12T17:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26169","summary":"Windows Error Reporting Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.34581,"ranking_epss":0.97013,"kev":true,"propose_action":"Microsoft Windows Error Reporting Service contains an improper privilege management vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.","ransomware_campaign":"Known","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26169","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26169","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-26169"],"published_time":"2024-03-12T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26173","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00276,"ranking_epss":0.51077,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26173","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26173"],"published_time":"2024-03-12T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26174","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00346,"ranking_epss":0.57208,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26174","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26174"],"published_time":"2024-03-12T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26176","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00142,"ranking_epss":0.34512,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26176","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26176"],"published_time":"2024-03-12T17:15:56","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26161","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01471,"ranking_epss":0.80968,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26161","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26161"],"published_time":"2024-03-12T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26162","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02249,"ranking_epss":0.84606,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26162","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26162"],"published_time":"2024-03-12T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26166","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01471,"ranking_epss":0.80968,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26166","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26166"],"published_time":"2024-03-12T17:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21446","summary":"NTFS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00078,"ranking_epss":0.23168,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21446","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21446"],"published_time":"2024-03-12T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21450","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01583,"ranking_epss":0.81625,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21450","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21450"],"published_time":"2024-03-12T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21451","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01056,"ranking_epss":0.77634,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21451","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21451"],"published_time":"2024-03-12T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-26159","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0163,"ranking_epss":0.81919,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26159","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26159"],"published_time":"2024-03-12T17:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21439","summary":"Windows Telephony Server Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00066,"ranking_epss":0.205,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21439","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21439"],"published_time":"2024-03-12T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21440","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01429,"ranking_epss":0.80673,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21440","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21440"],"published_time":"2024-03-12T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21441","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01171,"ranking_epss":0.78694,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21441","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21441"],"published_time":"2024-03-12T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21444","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00531,"ranking_epss":0.67315,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21444","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21444"],"published_time":"2024-03-12T17:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21436","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00258,"ranking_epss":0.49242,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21436","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21436"],"published_time":"2024-03-12T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21437","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.03014,"ranking_epss":0.8662,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21437","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21437"],"published_time":"2024-03-12T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21438","summary":"Microsoft AllJoyn API Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03412,"ranking_epss":0.87453,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21438","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21438"],"published_time":"2024-03-12T17:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21429","summary":"Windows USB Hub Driver Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00233,"ranking_epss":0.46224,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21429","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21429"],"published_time":"2024-03-12T17:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-50387","summary":"Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \"KeyTrap\" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.51989,"ranking_epss":0.97922,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2024/02/16/2","http://www.openwall.com/lists/oss-security/2024/02/16/3","https://access.redhat.com/security/cve/CVE-2023-50387","https://bugzilla.suse.com/show_bug.cgi?id=1219823","https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html","https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1","https://kb.isc.org/docs/cve-2023-50387","https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387","https://news.ycombinator.com/item?id=39367411","https://news.ycombinator.com/item?id=39372384","https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/","https://security.netapp.com/advisory/ntap-20240307-0007/","https://www.athene-center.de/aktuelles/key-trap","https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf","https://www.isc.org/blogs/2024-bind-security-release/","https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/","https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/","http://www.openwall.com/lists/oss-security/2024/02/16/2","http://www.openwall.com/lists/oss-security/2024/02/16/3","https://access.redhat.com/security/cve/CVE-2023-50387","https://bugzilla.suse.com/show_bug.cgi?id=1219823","https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html","https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1","https://kb.isc.org/docs/cve-2023-50387","https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html","https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html","https://lists.debian.org/debian-lts-announce/2024/09/msg00001.html","https://lists.debian.org/debian-lts-announce/2024/11/msg00035.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/","https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387","https://news.ycombinator.com/item?id=39367411","https://news.ycombinator.com/item?id=39372384","https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/","https://security.netapp.com/advisory/ntap-20240307-0007/","https://www.athene-center.de/aktuelles/key-trap","https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf","https://www.isc.org/blogs/2024-bind-security-release/","https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/","https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/"],"published_time":"2024-02-14T16:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21420","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01502,"ranking_epss":0.81185,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21420","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21420"],"published_time":"2024-02-13T18:16:00","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21405","summary":"Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00084,"ranking_epss":0.2453,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21405","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21405"],"published_time":"2024-02-13T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21406","summary":"Windows Printing Service Spoofing Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01257,"ranking_epss":0.79413,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21406","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21406"],"published_time":"2024-02-13T18:15:59","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21391","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0227,"ranking_epss":0.84665,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21391","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21391"],"published_time":"2024-02-13T18:15:57","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21375","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0192,"ranking_epss":0.83383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21375","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21375"],"published_time":"2024-02-13T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21367","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01901,"ranking_epss":0.83272,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21367","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21367"],"published_time":"2024-02-13T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21368","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01901,"ranking_epss":0.83272,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21368","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21368"],"published_time":"2024-02-13T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21369","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00852,"ranking_epss":0.74952,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21369","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21369"],"published_time":"2024-02-13T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21370","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0192,"ranking_epss":0.83383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21370","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21370"],"published_time":"2024-02-13T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21372","summary":"Windows OLE Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0153,"ranking_epss":0.81348,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21372","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21372"],"published_time":"2024-02-13T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21361","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01901,"ranking_epss":0.83272,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21361","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21361"],"published_time":"2024-02-13T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21363","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00427,"ranking_epss":0.62436,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21363","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21363"],"published_time":"2024-02-13T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21365","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0192,"ranking_epss":0.83383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21365","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21365"],"published_time":"2024-02-13T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21366","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0192,"ranking_epss":0.83383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21366","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21366"],"published_time":"2024-02-13T18:15:53","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21356","summary":"Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0533,"ranking_epss":0.90066,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21356","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21356"],"published_time":"2024-02-13T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21357","summary":"Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.17273,"ranking_epss":0.95051,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21357","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21357"],"published_time":"2024-02-13T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21358","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0192,"ranking_epss":0.83383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21358","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21358"],"published_time":"2024-02-13T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21359","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01901,"ranking_epss":0.83272,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21359","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21359"],"published_time":"2024-02-13T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21360","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0192,"ranking_epss":0.83383,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21360","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21360"],"published_time":"2024-02-13T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21350","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0061,"ranking_epss":0.69794,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21350","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21350"],"published_time":"2024-02-13T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21352","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0227,"ranking_epss":0.84665,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21352","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21352"],"published_time":"2024-02-13T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21347","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01081,"ranking_epss":0.7789,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21347","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21347"],"published_time":"2024-02-13T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21349","summary":"Microsoft ActiveX Data Objects Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.01901,"ranking_epss":0.83272,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21349","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21349"],"published_time":"2024-02-13T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21340","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":4.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.6,"cvss_v4":null,"epss":0.00131,"ranking_epss":0.32652,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21340","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21340"],"published_time":"2024-02-13T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21312","summary":".NET Framework Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05878,"ranking_epss":0.90592,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21312","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21312","https://security.netapp.com/advisory/ntap-20240208-0008/"],"published_time":"2024-01-09T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21313","summary":"Windows TCP/IP Information Disclosure Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00125,"ranking_epss":0.31699,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21313","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21313"],"published_time":"2024-01-09T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21314","summary":"Microsoft Message Queuing Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.04684,"ranking_epss":0.89355,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21314","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21314"],"published_time":"2024-01-09T18:15:55","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21307","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00134,"ranking_epss":0.33063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21307","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21307"],"published_time":"2024-01-09T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-21311","summary":"Windows Cryptographic Services Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00367,"ranking_epss":0.58685,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21311","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21311"],"published_time":"2024-01-09T18:15:54","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20691","summary":"Windows Themes Information Disclosure Vulnerability","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00127,"ranking_epss":0.32112,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20691","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20691"],"published_time":"2024-01-09T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20692","summary":"Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability","cvss":5.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.7,"cvss_v4":null,"epss":0.0107,"ranking_epss":0.77761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20692","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20692"],"published_time":"2024-01-09T18:15:52","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20680","summary":"Windows Message Queuing Client (MSMQC) Information Disclosure","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0339,"ranking_epss":0.87419,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20680","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20680"],"published_time":"2024-01-09T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20683","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0292,"ranking_epss":0.86412,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20683","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20683"],"published_time":"2024-01-09T18:15:51","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20674","summary":"Windows Kerberos Security Feature Bypass Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.16049,"ranking_epss":0.94795,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20674","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20674"],"published_time":"2024-01-09T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20660","summary":"Microsoft Message Queuing Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03672,"ranking_epss":0.87921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20660","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20660"],"published_time":"2024-01-09T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20661","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06652,"ranking_epss":0.91233,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20661","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20661"],"published_time":"2024-01-09T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20662","summary":"Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability","cvss":4.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.9,"cvss_v4":null,"epss":0.00817,"ranking_epss":0.74385,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20662","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20662"],"published_time":"2024-01-09T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20663","summary":"Windows Message Queuing Client (MSMQC) Information Disclosure","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03672,"ranking_epss":0.87921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20663","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20663"],"published_time":"2024-01-09T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20664","summary":"Microsoft Message Queuing Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.04684,"ranking_epss":0.89355,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20664","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20664"],"published_time":"2024-01-09T18:15:49","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20654","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.02145,"ranking_epss":0.84247,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20654","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20654"],"published_time":"2024-01-09T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20655","summary":"Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00416,"ranking_epss":0.61755,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20655","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20655"],"published_time":"2024-01-09T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20657","summary":"Windows Group Policy Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00269,"ranking_epss":0.50473,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20657","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20657"],"published_time":"2024-01-09T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20652","summary":"Windows HTML Platforms Security Feature Bypass Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.03082,"ranking_epss":0.86793,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20652","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20652"],"published_time":"2024-01-09T18:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-20653","summary":"Microsoft Common Log File System Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0292,"ranking_epss":0.86412,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20653","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20653"],"published_time":"2024-01-09T18:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0056","summary":"Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability","cvss":8.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.7,"cvss_v4":null,"epss":0.00864,"ranking_epss":0.75134,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0056","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0056"],"published_time":"2024-01-09T18:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2024-0057","summary":"NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability","cvss":9.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.1,"cvss_v4":null,"epss":0.03635,"ranking_epss":0.87854,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0057","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0057","https://security.netapp.com/advisory/ntap-20240208-0007/"],"published_time":"2024-01-09T18:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36005","summary":"Windows Telephony Server Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.08837,"ranking_epss":0.92552,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36005","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36005"],"published_time":"2023-12-12T18:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36006","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00209,"ranking_epss":0.43373,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36006","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36006"],"published_time":"2023-12-12T18:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36012","summary":"DHCP Server Service Information Disclosure Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00904,"ranking_epss":0.7575,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36012","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36012"],"published_time":"2023-12-12T18:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36004","summary":"Windows DPAPI (Data Protection Application Programming Interface) Spoofing Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00177,"ranking_epss":0.39235,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36004","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36004"],"published_time":"2023-12-12T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35639","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00904,"ranking_epss":0.75757,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35639","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35639"],"published_time":"2023-12-12T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35641","summary":"Internet Connection Sharing (ICS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.05218,"ranking_epss":0.8996,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35641","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35641"],"published_time":"2023-12-12T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35642","summary":"Internet Connection Sharing (ICS) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00491,"ranking_epss":0.65645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35642","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35642"],"published_time":"2023-12-12T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35630","summary":"Internet Connection Sharing (ICS) Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0258,"ranking_epss":0.85593,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35630","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35630"],"published_time":"2023-12-12T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35632","summary":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04036,"ranking_epss":0.88508,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35632","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35632"],"published_time":"2023-12-12T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35633","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02708,"ranking_epss":0.85921,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35633","http://packetstormsecurity.com/files/176451/Microsoft-Windows-Registry-Predefined-Keys-Privilege-Escalation.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35633"],"published_time":"2023-12-12T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35622","summary":"Windows DNS Spoofing Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00282,"ranking_epss":0.51662,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35622","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35622"],"published_time":"2023-12-12T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35628","summary":"Windows MSHTML Platform Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.17104,"ranking_epss":0.95013,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35628","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35628"],"published_time":"2023-12-12T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35629","summary":"Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00217,"ranking_epss":0.44332,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35629","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35629"],"published_time":"2023-12-12T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21740","summary":"Windows Media Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00353,"ranking_epss":0.57697,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21740","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21740"],"published_time":"2023-12-12T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36049","summary":".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability","cvss":7.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.6,"cvss_v4":null,"epss":0.02118,"ranking_epss":0.84156,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36049"],"published_time":"2023-11-14T21:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36705","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00162,"ranking_epss":0.37104,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36705","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36705"],"published_time":"2023-11-14T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36719","summary":"Microsoft Speech Application Programming Interface (SAPI) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00134,"ranking_epss":0.33119,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36719","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36719"],"published_time":"2023-11-14T18:15:50","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36560","summary":"ASP.NET Security Feature Bypass Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0417,"ranking_epss":0.88703,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36560","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36560"],"published_time":"2023-11-14T18:15:48","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36428","summary":"Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00169,"ranking_epss":0.38179,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36428","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36428"],"published_time":"2023-11-14T18:15:47","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36425","summary":"Windows Distributed File System (DFS) Remote Code Execution Vulnerability","cvss":8.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.0,"cvss_v4":null,"epss":0.00207,"ranking_epss":0.4315,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36425","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36425"],"published_time":"2023-11-14T18:15:46","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36423","summary":"Microsoft Remote Registry Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00574,"ranking_epss":0.68781,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36423","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36423"],"published_time":"2023-11-14T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36424","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.05545,"ranking_epss":0.90285,"kev":true,"propose_action":"Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36424","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36424"],"published_time":"2023-11-14T18:15:45","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36401","summary":"Microsoft Remote Registry Service Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.00319,"ranking_epss":0.54997,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36401","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36401"],"published_time":"2023-11-14T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36402","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00166,"ranking_epss":0.37774,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36402","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36402"],"published_time":"2023-11-14T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36403","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00213,"ranking_epss":0.43871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36403","http://packetstormsecurity.com/files/176209/Windows-Kernel-Race-Conditions.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36403"],"published_time":"2023-11-14T18:15:41","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36397","summary":"Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.03225,"ranking_epss":0.87081,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36397","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36397"],"published_time":"2023-11-14T18:15:39","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36395","summary":"Windows Deployment Services Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0122,"ranking_epss":0.79089,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36395","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36395"],"published_time":"2023-11-14T18:15:38","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36393","summary":"Windows User Interface Application Core Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00408,"ranking_epss":0.61201,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36393","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36393"],"published_time":"2023-11-14T18:15:37","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36036","summary":"Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01397,"ranking_epss":0.80431,"kev":true,"propose_action":"Microsoft Windows Cloud Files Mini Filter Driver contains a privilege escalation vulnerability that could allow an attacker to gain SYSTEM privileges.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36036"],"published_time":"2023-11-14T18:15:33","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36017","summary":"Windows Scripting Engine Memory Corruption Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02717,"ranking_epss":0.85948,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36017","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36017"],"published_time":"2023-11-14T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36025","summary":"Windows SmartScreen Security Feature Bypass Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.90206,"ranking_epss":0.99594,"kev":true,"propose_action":"Microsoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to bypass Windows Defender SmartScreen checks and their associated prompts.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36025"],"published_time":"2023-11-14T18:15:31","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38166","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38166","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38166"],"published_time":"2023-10-10T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41765","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41765","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41765"],"published_time":"2023-10-10T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41766","summary":"Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00801,"ranking_epss":0.74119,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41766","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41766"],"published_time":"2023-10-10T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41767","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41767","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41767"],"published_time":"2023-10-10T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41768","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41768","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41768"],"published_time":"2023-10-10T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41769","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41769","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41769"],"published_time":"2023-10-10T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41770","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41770","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41770"],"published_time":"2023-10-10T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41771","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41771","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41771"],"published_time":"2023-10-10T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41773","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41773","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41773"],"published_time":"2023-10-10T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-41774","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00218,"ranking_epss":0.44414,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41774","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41774"],"published_time":"2023-10-10T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36731","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00721,"ranking_epss":0.72542,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36731","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36731"],"published_time":"2023-10-10T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36732","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00103,"ranking_epss":0.28151,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36732","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36732"],"published_time":"2023-10-10T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36743","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01236,"ranking_epss":0.79231,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36743","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36743"],"published_time":"2023-10-10T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36776","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00949,"ranking_epss":0.76399,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36776","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36776"],"published_time":"2023-10-10T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36790","summary":"Windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0019,"ranking_epss":0.40851,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36790","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36790"],"published_time":"2023-10-10T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36712","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00258,"ranking_epss":0.49252,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36712","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36712"],"published_time":"2023-10-10T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36713","summary":"Windows Common Log File System Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.02083,"ranking_epss":0.84024,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36713","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36713"],"published_time":"2023-10-10T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36722","summary":"Active Directory Domain Services Information Disclosure Vulnerability","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00068,"ranking_epss":0.21079,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36722","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36722"],"published_time":"2023-10-10T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36724","summary":"Windows Power Management Service Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.27974,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36724","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36724"],"published_time":"2023-10-10T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36726","summary":"Windows Internet Key Exchange (IKE) Extension Elevation of Privilege  Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.27975,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36726","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36726"],"published_time":"2023-10-10T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36606","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.49765,"ranking_epss":0.97819,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36606","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36606"],"published_time":"2023-10-10T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36697","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00144,"ranking_epss":0.34693,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36697","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36697"],"published_time":"2023-10-10T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36702","summary":"Microsoft DirectMusic Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00273,"ranking_epss":0.50758,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36702","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36702"],"published_time":"2023-10-10T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36703","summary":"DHCP Server Service Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.07996,"ranking_epss":0.92101,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36703","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36703"],"published_time":"2023-10-10T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36706","summary":"Windows Deployment Services Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0608,"ranking_epss":0.9078,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36706","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36706"],"published_time":"2023-10-10T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36710","summary":"Windows Media Foundation Core Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00228,"ranking_epss":0.45577,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36710","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36710"],"published_time":"2023-10-10T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36579","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06827,"ranking_epss":0.91365,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36579","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36579"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36581","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00387,"ranking_epss":0.59884,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36581","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36581"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36582","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00653,"ranking_epss":0.70939,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36582","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36582"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36583","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00611,"ranking_epss":0.69843,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36583","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36583"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36584","summary":"Windows Mark of the Web Security Feature Bypass Vulnerability","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.15418,"ranking_epss":0.94662,"kev":true,"propose_action":"Microsoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36584","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36584","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36584"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36585","summary":"Windows upnphost.dll Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03669,"ranking_epss":0.87916,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36585","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36585"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36589","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36589","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36589"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36590","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.0031,"ranking_epss":0.54197,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36590","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36590"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36591","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36591","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36591"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36592","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36592","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36592"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36593","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0065,"ranking_epss":0.70867,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36593","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36593"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36594","summary":"Windows Graphics Component Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02772,"ranking_epss":0.86061,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36594","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36594"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36598","summary":"Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00461,"ranking_epss":0.64196,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36598","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36598"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36602","summary":"Windows TCP/IP Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03748,"ranking_epss":0.88037,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36602","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36602"],"published_time":"2023-10-10T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36563","summary":"Microsoft WordPad Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02473,"ranking_epss":0.85295,"kev":true,"propose_action":"Microsoft WordPad contains an unspecified vulnerability that allows for information disclosure.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36563","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36563","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36563"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36564","summary":"Windows Search Security Feature Bypass Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00135,"ranking_epss":0.33135,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36564","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36564"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36567","summary":"Windows Deployment Services Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05289,"ranking_epss":0.90028,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36567","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36567"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36570","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36570","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36570"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36571","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36571","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36571"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36572","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36572","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36572"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36573","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36573","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36573"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36574","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36574","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36574"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36575","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00423,"ranking_epss":0.62188,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36575","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36575"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36577","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00191,"ranking_epss":0.41078,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36577","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36577"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36578","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.3,"cvss_v4":null,"epss":0.00296,"ranking_epss":0.5297,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36578","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36578"],"published_time":"2023-10-10T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36431","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.06827,"ranking_epss":0.91365,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36431","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36431"],"published_time":"2023-10-10T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36434","summary":"Windows IIS Server Elevation of Privilege Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02926,"ranking_epss":0.86431,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36434","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36434"],"published_time":"2023-10-10T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36436","summary":"Windows MSHTML Platform Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00298,"ranking_epss":0.53213,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36436","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36436"],"published_time":"2023-10-10T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36438","summary":"Windows TCP/IP Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00816,"ranking_epss":0.74344,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36438","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36438"],"published_time":"2023-10-10T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29348","summary":"Windows Remote Desktop Gateway (RD Gateway) Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0069,"ranking_epss":0.71824,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29348","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29348"],"published_time":"2023-10-10T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35349","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01159,"ranking_epss":0.78603,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35349","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35349"],"published_time":"2023-10-10T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38161","summary":"Windows GDI Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21608,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38161","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38161"],"published_time":"2023-09-12T17:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38160","summary":"Windows TCP/IP Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00221,"ranking_epss":0.44761,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38160","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38160"],"published_time":"2023-09-12T17:15:21","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38149","summary":"Windows TCP/IP Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.05411,"ranking_epss":0.90159,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38149","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38149"],"published_time":"2023-09-12T17:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38152","summary":"DHCP Server Service Information Disclosure Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.0239,"ranking_epss":0.85049,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38152","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38152"],"published_time":"2023-09-12T17:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38142","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04835,"ranking_epss":0.89533,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38142","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38142"],"published_time":"2023-09-12T17:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38143","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01242,"ranking_epss":0.79282,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38143","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38143"],"published_time":"2023-09-12T17:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38144","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01242,"ranking_epss":0.79282,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38144","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38144"],"published_time":"2023-09-12T17:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36804","summary":"Windows GDI Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00071,"ranking_epss":0.21608,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36804","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36804"],"published_time":"2023-09-12T17:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38139","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00584,"ranking_epss":0.69067,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38139","http://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38139"],"published_time":"2023-09-12T17:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38141","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00312,"ranking_epss":0.54416,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38141","http://packetstormsecurity.com/files/175096/Microsoft-Windows-Kernel-Race-Condition-Memory-Corruption.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38141"],"published_time":"2023-09-12T17:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36796","summary":"Visual Studio Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0124,"ranking_epss":0.79262,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796"],"published_time":"2023-09-12T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36801","summary":"DHCP Server Service Information Disclosure Vulnerability","cvss":5.3,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.3,"cvss_v4":null,"epss":0.00248,"ranking_epss":0.48136,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36801","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36801"],"published_time":"2023-09-12T17:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36788","summary":".NET Framework Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00382,"ranking_epss":0.59627,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36788","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36788"],"published_time":"2023-09-12T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36792","summary":"Visual Studio Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01598,"ranking_epss":0.81719,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792"],"published_time":"2023-09-12T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36793","summary":"Visual Studio Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01903,"ranking_epss":0.83281,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793"],"published_time":"2023-09-12T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36794","summary":"Visual Studio Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01232,"ranking_epss":0.792,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794"],"published_time":"2023-09-12T17:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36873","summary":".NET Framework Spoofing Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00414,"ranking_epss":0.61587,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36873","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36873"],"published_time":"2023-08-08T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36899","summary":"ASP.NET Elevation of Privilege Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.70037,"ranking_epss":0.98677,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36899","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36899"],"published_time":"2023-08-08T19:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38254","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00807,"ranking_epss":0.74219,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38254","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38254"],"published_time":"2023-08-08T18:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38172","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02736,"ranking_epss":0.85992,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38172","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38172"],"published_time":"2023-08-08T18:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-38184","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02638,"ranking_epss":0.85731,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38184","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38184"],"published_time":"2023-08-08T18:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36913","summary":"Microsoft Message Queuing Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00373,"ranking_epss":0.59077,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36913","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36913"],"published_time":"2023-08-08T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36912","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04109,"ranking_epss":0.88618,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36912","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36912"],"published_time":"2023-08-08T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36911","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02937,"ranking_epss":0.8645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36911","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36911"],"published_time":"2023-08-08T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36900","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.24034,"ranking_epss":0.96057,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36900","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36900"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36903","summary":"Windows System Assessment Tool Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00773,"ranking_epss":0.73616,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36903","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36903"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36906","summary":"Windows Cryptographic Services Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.03421,"ranking_epss":0.87468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36906","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36906"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36907","summary":"Windows Cryptographic Services Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.03421,"ranking_epss":0.87468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36907","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36907"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36908","summary":"Windows Hyper-V Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00186,"ranking_epss":0.40468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36908","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36908"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36909","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00466,"ranking_epss":0.64441,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36909","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36909"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36910","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02937,"ranking_epss":0.8645,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36910","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36910"],"published_time":"2023-08-08T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36889","summary":"Windows Group Policy Security Feature Bypass Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00123,"ranking_epss":0.31454,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36889","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36889"],"published_time":"2023-08-08T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36876","summary":"Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00102,"ranking_epss":0.28059,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36876","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36876"],"published_time":"2023-08-08T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36882","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00379,"ranking_epss":0.59466,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36882","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36882"],"published_time":"2023-08-08T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35383","summary":"Microsoft Message Queuing Information Disclosure Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02712,"ranking_epss":0.85934,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35383","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35383"],"published_time":"2023-08-08T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35384","summary":"Windows HTML Platforms Security Feature Bypass Vulnerability","cvss":5.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.4,"cvss_v4":null,"epss":0.00144,"ranking_epss":0.34741,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35384","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35384"],"published_time":"2023-08-08T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35385","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02709,"ranking_epss":0.85922,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35385","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35385"],"published_time":"2023-08-08T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35359","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01984,"ranking_epss":0.83623,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35359","http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35359"],"published_time":"2023-08-08T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35376","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00951,"ranking_epss":0.76426,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35376","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35376"],"published_time":"2023-08-08T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35377","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00951,"ranking_epss":0.76426,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35377","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35377"],"published_time":"2023-08-08T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35379","summary":"Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00105,"ranking_epss":0.2855,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35379","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35379"],"published_time":"2023-08-08T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35380","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01877,"ranking_epss":0.83167,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35380","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35380"],"published_time":"2023-08-08T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35381","summary":"Windows Fax Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00261,"ranking_epss":0.49537,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35381","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35381"],"published_time":"2023-08-08T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-20569","summary":"\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n","cvss":4.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.7,"cvss_v4":null,"epss":0.00633,"ranking_epss":0.70398,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/08/08/4","http://xenbits.xen.org/xsa/advisory-434.html","https://comsec.ethz.ch/research/microarch/inception/","https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/","https://security.netapp.com/advisory/ntap-20240605-0006/","https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005","https://www.debian.org/security/2023/dsa-5475","http://www.openwall.com/lists/oss-security/2023/08/08/4","http://xenbits.xen.org/xsa/advisory-434.html","https://comsec.ethz.ch/research/microarch/inception/","https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/","https://security.netapp.com/advisory/ntap-20240605-0006/","https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005","https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html","https://www.debian.org/security/2023/dsa-5475"],"published_time":"2023-08-08T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-20588","summary":"\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.07781,"ranking_epss":0.9198,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["http://www.openwall.com/lists/oss-security/2023/09/25/3","http://www.openwall.com/lists/oss-security/2023/09/25/4","http://www.openwall.com/lists/oss-security/2023/09/25/5","http://www.openwall.com/lists/oss-security/2023/09/25/7","http://www.openwall.com/lists/oss-security/2023/09/25/8","http://www.openwall.com/lists/oss-security/2023/09/26/5","http://www.openwall.com/lists/oss-security/2023/09/26/8","http://www.openwall.com/lists/oss-security/2023/09/26/9","http://www.openwall.com/lists/oss-security/2023/09/27/1","http://www.openwall.com/lists/oss-security/2023/10/03/12","http://www.openwall.com/lists/oss-security/2023/10/03/13","http://www.openwall.com/lists/oss-security/2023/10/03/14","http://www.openwall.com/lists/oss-security/2023/10/03/15","http://www.openwall.com/lists/oss-security/2023/10/03/16","http://www.openwall.com/lists/oss-security/2023/10/03/9","http://www.openwall.com/lists/oss-security/2023/10/04/1","http://www.openwall.com/lists/oss-security/2023/10/04/2","http://www.openwall.com/lists/oss-security/2023/10/04/3","http://www.openwall.com/lists/oss-security/2023/10/04/4","http://xenbits.xen.org/xsa/advisory-439.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/","https://security.netapp.com/advisory/ntap-20240531-0005/","https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492","http://www.openwall.com/lists/oss-security/2023/09/25/3","http://www.openwall.com/lists/oss-security/2023/09/25/4","http://www.openwall.com/lists/oss-security/2023/09/25/5","http://www.openwall.com/lists/oss-security/2023/09/25/7","http://www.openwall.com/lists/oss-security/2023/09/25/8","http://www.openwall.com/lists/oss-security/2023/09/26/5","http://www.openwall.com/lists/oss-security/2023/09/26/8","http://www.openwall.com/lists/oss-security/2023/09/26/9","http://www.openwall.com/lists/oss-security/2023/09/27/1","http://www.openwall.com/lists/oss-security/2023/10/03/12","http://www.openwall.com/lists/oss-security/2023/10/03/13","http://www.openwall.com/lists/oss-security/2023/10/03/14","http://www.openwall.com/lists/oss-security/2023/10/03/15","http://www.openwall.com/lists/oss-security/2023/10/03/16","http://www.openwall.com/lists/oss-security/2023/10/03/9","http://www.openwall.com/lists/oss-security/2023/10/04/1","http://www.openwall.com/lists/oss-security/2023/10/04/2","http://www.openwall.com/lists/oss-security/2023/10/04/3","http://www.openwall.com/lists/oss-security/2023/10/04/4","http://xenbits.xen.org/xsa/advisory-439.html","https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/","https://security.netapp.com/advisory/ntap-20240531-0005/","https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007","https://www.debian.org/security/2023/dsa-5480","https://www.debian.org/security/2023/dsa-5492"],"published_time":"2023-08-08T18:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36884","summary":"Windows Search Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.9322,"ranking_epss":0.99803,"kev":true,"propose_action":"Microsoft Windows Search contains an unspecified vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file, leading to remote code execution.","ransomware_campaign":"Known","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884","http://seclists.org/fulldisclosure/2023/Jul/43","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36884"],"published_time":"2023-07-11T19:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-36874","summary":"Windows Error Reporting Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.71153,"ranking_epss":0.98716,"kev":true,"propose_action":"Microsoft Windows Error Reporting Service contains an unspecified vulnerability that allows for privilege escalation.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874","http://packetstormsecurity.com/files/174843/Microsoft-Error-Reporting-Local-Privilege-Elevation.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-36874"],"published_time":"2023-07-11T18:15:20","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35346","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00219,"ranking_epss":0.44597,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35346","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35346"],"published_time":"2023-07-11T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35350","summary":"Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.01207,"ranking_epss":0.78987,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35350","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35350"],"published_time":"2023-07-11T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35351","summary":"Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00284,"ranking_epss":0.51885,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35351","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35351"],"published_time":"2023-07-11T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35365","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02221,"ranking_epss":0.84519,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35365","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35365"],"published_time":"2023-07-11T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35366","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01971,"ranking_epss":0.83576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35366","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35366"],"published_time":"2023-07-11T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35367","summary":"Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01971,"ranking_epss":0.83576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35367","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35367"],"published_time":"2023-07-11T18:15:19","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35328","summary":"Windows Transaction Manager Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00131,"ranking_epss":0.32612,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35328","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35328"],"published_time":"2023-07-11T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35330","summary":"Windows Extended Negotiation Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01133,"ranking_epss":0.78366,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35330","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35330"],"published_time":"2023-07-11T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35332","summary":"Windows Remote Desktop Protocol Security Feature Bypass","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00069,"ranking_epss":0.21128,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35332","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35332"],"published_time":"2023-07-11T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35338","summary":"Windows Peer Name Resolution Protocol Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03803,"ranking_epss":0.88104,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35338","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35338"],"published_time":"2023-07-11T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35340","summary":"Windows CNG Key Isolation Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00067,"ranking_epss":0.20743,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35340","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35340"],"published_time":"2023-07-11T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35341","summary":"Microsoft DirectMusic Information Disclosure Vulnerability","cvss":6.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.2,"cvss_v4":null,"epss":0.00256,"ranking_epss":0.49002,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35341","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35341"],"published_time":"2023-07-11T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35342","summary":"Windows Image Acquisition Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00124,"ranking_epss":0.31589,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35342","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35342"],"published_time":"2023-07-11T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35344","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00219,"ranking_epss":0.44597,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35344","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35344"],"published_time":"2023-07-11T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35345","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00219,"ranking_epss":0.44597,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35345","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35345"],"published_time":"2023-07-11T18:15:18","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35309","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00612,"ranking_epss":0.69865,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35309","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35309"],"published_time":"2023-07-11T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35310","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00217,"ranking_epss":0.44362,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35310","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35310"],"published_time":"2023-07-11T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35312","summary":"Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00415,"ranking_epss":0.61683,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35312","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35312"],"published_time":"2023-07-11T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35314","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35314","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35314"],"published_time":"2023-07-11T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35316","summary":"Remote Procedure Call Runtime Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03017,"ranking_epss":0.86629,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35316","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35316"],"published_time":"2023-07-11T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35318","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35318","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35318"],"published_time":"2023-07-11T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35319","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35319","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35319"],"published_time":"2023-07-11T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35321","summary":"Windows Deployment Services Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03233,"ranking_epss":0.87091,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35321","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35321"],"published_time":"2023-07-11T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35322","summary":"Windows Deployment Services Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02312,"ranking_epss":0.84794,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35322","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35322"],"published_time":"2023-07-11T18:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35296","summary":"Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.03661,"ranking_epss":0.87904,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35296","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35296"],"published_time":"2023-07-11T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35297","summary":"Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00255,"ranking_epss":0.48873,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35297","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35297"],"published_time":"2023-07-11T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35299","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00148,"ranking_epss":0.35231,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35299","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35299"],"published_time":"2023-07-11T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35300","summary":"Remote Procedure Call Runtime Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.02516,"ranking_epss":0.85431,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35300","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35300"],"published_time":"2023-07-11T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-35303","summary":"USB Audio Class System Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00707,"ranking_epss":0.72212,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35303","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35303"],"published_time":"2023-07-11T18:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33163","summary":"Windows Network Load Balancing Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00137,"ranking_epss":0.33547,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33163","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33163"],"published_time":"2023-07-11T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33164","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33164","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33164"],"published_time":"2023-07-11T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33166","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33166","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33166"],"published_time":"2023-07-11T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33167","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33167","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33167"],"published_time":"2023-07-11T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33168","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33168","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33168"],"published_time":"2023-07-11T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33169","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33169","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33169"],"published_time":"2023-07-11T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33172","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33172","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33172"],"published_time":"2023-07-11T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33173","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33173","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33173"],"published_time":"2023-07-11T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33174","summary":"Windows Cryptographic Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.0025,"ranking_epss":0.48294,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33174","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33174"],"published_time":"2023-07-11T18:15:15","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-33154","summary":"Windows Partition Management Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01084,"ranking_epss":0.7791,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33154","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33154"],"published_time":"2023-07-11T18:15:14","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32042","summary":"OLE Automation Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.00455,"ranking_epss":0.63861,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32042","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32042"],"published_time":"2023-07-11T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32043","summary":"Windows Remote Desktop Security Feature Bypass Vulnerability","cvss":6.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.8,"cvss_v4":null,"epss":0.00074,"ranking_epss":0.22493,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32043","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32043"],"published_time":"2023-07-11T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32044","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02873,"ranking_epss":0.86297,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32044","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32044"],"published_time":"2023-07-11T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32045","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02873,"ranking_epss":0.86297,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32045","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32045"],"published_time":"2023-07-11T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32046","summary":"Windows MSHTML Platform Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.42658,"ranking_epss":0.97482,"kev":true,"propose_action":"Microsoft Windows MSHTML Platform contains an unspecified vulnerability that allows for privilege escalation.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32046","http://seclists.org/fulldisclosure/2023/Jul/43","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32046","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-32046"],"published_time":"2023-07-11T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32050","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00108,"ranking_epss":0.29063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32050","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32050"],"published_time":"2023-07-11T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32053","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00123,"ranking_epss":0.31419,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32053","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32053"],"published_time":"2023-07-11T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32055","summary":"Active Template Library Elevation of Privilege Vulnerability","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.0008,"ranking_epss":0.23558,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32055","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32055"],"published_time":"2023-07-11T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32057","summary":"Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02244,"ranking_epss":0.84593,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32057","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32057"],"published_time":"2023-07-11T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-21526","summary":"Windows Netlogon Information Disclosure Vulnerability","cvss":7.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.4,"cvss_v4":null,"epss":0.00729,"ranking_epss":0.72681,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21526","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21526"],"published_time":"2023-07-11T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32033","summary":"Microsoft Failover Cluster Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00366,"ranking_epss":0.58654,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32033","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32033"],"published_time":"2023-07-11T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32034","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32034","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32034"],"published_time":"2023-07-11T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32035","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.0327,"ranking_epss":0.87182,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32035","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32035"],"published_time":"2023-07-11T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32038","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00399,"ranking_epss":0.60683,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32038","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32038"],"published_time":"2023-07-11T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24895","summary":".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01115,"ranking_epss":0.78222,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895"],"published_time":"2023-06-14T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24897","summary":".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02018,"ranking_epss":0.83787,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897"],"published_time":"2023-06-14T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24936","summary":".NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01159,"ranking_epss":0.78607,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936"],"published_time":"2023-06-14T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29326","summary":".NET Framework Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00622,"ranking_epss":0.7017,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29326","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29326"],"published_time":"2023-06-14T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29331","summary":".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.01128,"ranking_epss":0.78324,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29331","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29331"],"published_time":"2023-06-14T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32030","summary":".NET and Visual Studio Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04971,"ranking_epss":0.89699,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32030","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32030"],"published_time":"2023-06-14T15:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32011","summary":"Windows iSCSI Discovery Service Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03324,"ranking_epss":0.87298,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32011","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32011"],"published_time":"2023-06-14T00:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32014","summary":"Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.04474,"ranking_epss":0.89111,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32014","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32014"],"published_time":"2023-06-14T00:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32015","summary":"Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.02576,"ranking_epss":0.85582,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32015","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32015"],"published_time":"2023-06-14T00:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32016","summary":"Windows Installer Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00226,"ranking_epss":0.454,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32016","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32016"],"published_time":"2023-06-14T00:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32017","summary":"Microsoft PostScript Printer Driver Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00155,"ranking_epss":0.36217,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32017","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32017"],"published_time":"2023-06-14T00:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-32020","summary":"Windows DNS Spoofing Vulnerability","cvss":5.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.6,"cvss_v4":null,"epss":0.01191,"ranking_epss":0.78864,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32020","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32020"],"published_time":"2023-06-14T00:15:11","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29359","summary":"GDI Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00176,"ranking_epss":0.39093,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29359","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29359"],"published_time":"2023-06-14T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29362","summary":"Remote Desktop Client Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00567,"ranking_epss":0.68556,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29362","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29362"],"published_time":"2023-06-14T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29363","summary":"Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.05557,"ranking_epss":0.90295,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29363","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29363"],"published_time":"2023-06-14T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29364","summary":"Windows Authentication Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00365,"ranking_epss":0.58557,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29364","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29364"],"published_time":"2023-06-14T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29365","summary":"Windows Media Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01267,"ranking_epss":0.79491,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29365","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29365"],"published_time":"2023-06-14T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29368","summary":"Windows Filtering Platform Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00128,"ranking_epss":0.3212,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29368","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29368"],"published_time":"2023-06-14T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29371","summary":"Windows GDI Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.01244,"ranking_epss":0.79294,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29371","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29371"],"published_time":"2023-06-14T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29372","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.0063,"ranking_epss":0.70326,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29372","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29372"],"published_time":"2023-06-14T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29373","summary":"Microsoft ODBC Driver Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00562,"ranking_epss":0.68389,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29373","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29373"],"published_time":"2023-06-14T00:15:10","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29346","summary":"NTFS Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00199,"ranking_epss":0.42021,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29346","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29346"],"published_time":"2023-06-14T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29351","summary":"Windows Group Policy Elevation of Privilege Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.03007,"ranking_epss":0.86603,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29351","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29351"],"published_time":"2023-06-14T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29358","summary":"Windows GDI Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.02345,"ranking_epss":0.849,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29358","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29358"],"published_time":"2023-06-14T00:15:09","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35756","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.14966,"ranking_epss":0.94577,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35756","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35756"],"published_time":"2023-05-31T19:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35758","summary":"Windows Kernel Memory Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00324,"ranking_epss":0.55489,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35758","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35758"],"published_time":"2023-05-31T19:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35759","summary":"Windows Local Security Authority (LSA) Denial of Service Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.04815,"ranking_epss":0.89517,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35759","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35759"],"published_time":"2023-05-31T19:15:17","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35743","summary":"Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00371,"ranking_epss":0.58963,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35743","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35743"],"published_time":"2023-05-31T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35744","summary":"Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.15493,"ranking_epss":0.94676,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35744","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35744"],"published_time":"2023-05-31T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35745","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.02634,"ranking_epss":0.8572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35745","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35745"],"published_time":"2023-05-31T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35747","summary":"Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.01096,"ranking_epss":0.7803,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35747","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35747"],"published_time":"2023-05-31T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35750","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.04473,"ranking_epss":0.8911,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750"],"published_time":"2023-05-31T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35751","summary":"Windows Hyper-V Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.06584,"ranking_epss":0.91181,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35751","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35751"],"published_time":"2023-05-31T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35752","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.02634,"ranking_epss":0.8572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35752","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35752"],"published_time":"2023-05-31T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2022-35753","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.02634,"ranking_epss":0.8572,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35753","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35753"],"published_time":"2023-05-31T19:15:16","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24954","summary":"Microsoft SharePoint Server Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.02282,"ranking_epss":0.84707,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24954","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24954"],"published_time":"2023-05-09T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28251","summary":"Windows Driver Revocation List Security Feature Bypass Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00185,"ranking_epss":0.40261,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28251","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28251"],"published_time":"2023-05-09T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28283","summary":"Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00764,"ranking_epss":0.73463,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28283","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28283"],"published_time":"2023-05-09T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29324","summary":"Windows MSHTML Platform Security Feature Bypass Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01873,"ranking_epss":0.83146,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29324","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29324"],"published_time":"2023-05-09T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29325","summary":"Windows OLE Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.22073,"ranking_epss":0.95802,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29325","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29325"],"published_time":"2023-05-09T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29335","summary":"Microsoft Word Security Feature Bypass Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.00368,"ranking_epss":0.58773,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29335","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29335"],"published_time":"2023-05-09T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-29336","summary":"Win32k Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.79462,"ranking_epss":0.99085,"kev":true,"propose_action":"Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation up to SYSTEM privileges.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336","https://www.exploit-db.com/exploits/52301","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-29336"],"published_time":"2023-05-09T18:15:13","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24900","summary":"Windows NTLM Security Support Provider Information Disclosure Vulnerability","cvss":5.9,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.9,"cvss_v4":null,"epss":0.00494,"ranking_epss":0.6577,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24900","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24900"],"published_time":"2023-05-09T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24903","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00723,"ranking_epss":0.72589,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24903","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24903"],"published_time":"2023-05-09T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24904","summary":"Windows Installer Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00141,"ranking_epss":0.34248,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24904","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24904"],"published_time":"2023-05-09T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24932","summary":"Secure Boot Security Feature Bypass Vulnerability","cvss":6.7,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.7,"cvss_v4":null,"epss":0.00565,"ranking_epss":0.68468,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932"],"published_time":"2023-05-09T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24940","summary":"Windows Pragmatic General Multicast (PGM) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.04069,"ranking_epss":0.88552,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24940","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24940"],"published_time":"2023-05-09T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24942","summary":"Remote Procedure Call Runtime Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03324,"ranking_epss":0.87298,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24942","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24942"],"published_time":"2023-05-09T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24943","summary":"Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.01459,"ranking_epss":0.80871,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24943","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24943"],"published_time":"2023-05-09T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24945","summary":"Windows iSCSI Target Service Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00366,"ranking_epss":0.58662,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24945","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24945"],"published_time":"2023-05-09T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-24946","summary":"Windows Backup Service Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.00106,"ranking_epss":0.28767,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24946","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24946"],"published_time":"2023-05-09T18:15:12","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28305","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00363,"ranking_epss":0.5846,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28305","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28305"],"published_time":"2023-04-11T21:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28306","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00363,"ranking_epss":0.5846,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28306","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28306"],"published_time":"2023-04-11T21:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28307","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00363,"ranking_epss":0.5846,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28307","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28307"],"published_time":"2023-04-11T21:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28308","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.00363,"ranking_epss":0.5846,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28308","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28308"],"published_time":"2023-04-11T21:15:28","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28293","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.07628,"ranking_epss":0.91888,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28293","http://packetstormsecurity.com/files/173135/Microsoft-Windows-11-22h2-Kernel-Privilege-Escalation.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28293"],"published_time":"2023-04-11T21:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28298","summary":"Windows Kernel Denial of Service Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00435,"ranking_epss":0.62975,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28298","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28298"],"published_time":"2023-04-11T21:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28302","summary":"Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.35436,"ranking_epss":0.97063,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28302","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28302"],"published_time":"2023-04-11T21:15:27","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28271","summary":"Windows Kernel Memory Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00279,"ranking_epss":0.51333,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28271","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28271"],"published_time":"2023-04-11T21:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28272","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.0047,"ranking_epss":0.64596,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28272","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28272"],"published_time":"2023-04-11T21:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28275","summary":"Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00511,"ranking_epss":0.66476,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28275","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28275"],"published_time":"2023-04-11T21:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28276","summary":"Windows Group Policy Security Feature Bypass Vulnerability","cvss":4.4,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":4.4,"cvss_v4":null,"epss":0.00783,"ranking_epss":0.73793,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28276","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28276"],"published_time":"2023-04-11T21:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28278","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0038,"ranking_epss":0.59545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28278","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28278"],"published_time":"2023-04-11T21:15:26","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28252","summary":"Windows Common Log File System Driver Elevation of Privilege Vulnerability","cvss":7.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.8,"cvss_v4":null,"epss":0.64922,"ranking_epss":0.98476,"kev":true,"propose_action":"Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.","ransomware_campaign":"Known","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252","http://packetstormsecurity.com/files/174668/Windows-Common-Log-File-System-Driver-clfs.sys-Privilege-Escalation.html","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28252"],"published_time":"2023-04-11T21:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28253","summary":"Windows Kernel Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.00865,"ranking_epss":0.75152,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28253","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28253"],"published_time":"2023-04-11T21:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28254","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":7.2,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.2,"cvss_v4":null,"epss":0.05382,"ranking_epss":0.90127,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28254","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28254"],"published_time":"2023-04-11T21:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28255","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0038,"ranking_epss":0.59545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28255","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28255"],"published_time":"2023-04-11T21:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28256","summary":"Windows DNS Server Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.0038,"ranking_epss":0.59545,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28256","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28256"],"published_time":"2023-04-11T21:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28266","summary":"Windows Common Log File System Driver Information Disclosure Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.03507,"ranking_epss":0.87636,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28266","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28266"],"published_time":"2023-04-11T21:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28267","summary":"Remote Desktop Protocol Client Information Disclosure Vulnerability","cvss":6.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.5,"cvss_v4":null,"epss":0.01534,"ranking_epss":0.81369,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28267","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28267"],"published_time":"2023-04-11T21:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28268","summary":"Netlogon RPC Elevation of Privilege Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.00891,"ranking_epss":0.75576,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28268","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28268"],"published_time":"2023-04-11T21:15:25","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28238","summary":"Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.02096,"ranking_epss":0.8407,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28238","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28238"],"published_time":"2023-04-11T21:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28240","summary":"Windows Network Load Balancing Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.00192,"ranking_epss":0.41128,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28240","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28240"],"published_time":"2023-04-11T21:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28241","summary":"Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.14592,"ranking_epss":0.9449,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28241","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28241"],"published_time":"2023-04-11T21:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28244","summary":"Windows Kerberos Elevation of Privilege Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.03602,"ranking_epss":0.87788,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28244","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28244"],"published_time":"2023-04-11T21:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28250","summary":"Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability","cvss":9.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":9.8,"cvss_v4":null,"epss":0.05336,"ranking_epss":0.90071,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28250","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28250"],"published_time":"2023-04-11T21:15:24","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28227","summary":"Windows Bluetooth Driver Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03322,"ranking_epss":0.87291,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28227","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28227"],"published_time":"2023-04-11T21:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28228","summary":"Windows Spoofing Vulnerability","cvss":5.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":5.5,"cvss_v4":null,"epss":0.01048,"ranking_epss":0.77557,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28228","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28228"],"published_time":"2023-04-11T21:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28229","summary":"Windows CNG Key Isolation Service Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.1019,"ranking_epss":0.93148,"kev":true,"propose_action":"Microsoft Windows Cryptographic Next Generation (CNG) Key Isolation Service contains an unspecified vulnerability that allows an attacker to gain specific limited SYSTEM privileges.","ransomware_campaign":"Unknown","references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28229"],"published_time":"2023-04-11T21:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28231","summary":"DHCP Server Service Remote Code Execution Vulnerability","cvss":8.8,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.8,"cvss_v4":null,"epss":0.73444,"ranking_epss":0.98807,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28231","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28231"],"published_time":"2023-04-11T21:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28232","summary":"Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.0038,"ranking_epss":0.5954,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28232","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28232"],"published_time":"2023-04-11T21:15:23","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28216","summary":"Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.00443,"ranking_epss":0.63346,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28216","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28216"],"published_time":"2023-04-11T21:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28217","summary":"Windows Network Address Translation (NAT) Denial of Service Vulnerability","cvss":7.5,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.5,"cvss_v4":null,"epss":0.03104,"ranking_epss":0.86831,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28217","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28217"],"published_time":"2023-04-11T21:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28218","summary":"Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability","cvss":7.0,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.0,"cvss_v4":null,"epss":0.30399,"ranking_epss":0.96709,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28218","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28218"],"published_time":"2023-04-11T21:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28219","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.08098,"ranking_epss":0.92162,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28219","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28219"],"published_time":"2023-04-11T21:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28220","summary":"Layer 2 Tunneling Protocol Remote Code Execution Vulnerability","cvss":8.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":8.1,"cvss_v4":null,"epss":0.06215,"ranking_epss":0.90899,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28220","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28220"],"published_time":"2023-04-11T21:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28222","summary":"Windows Kernel Elevation of Privilege Vulnerability","cvss":7.1,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":7.1,"cvss_v4":null,"epss":0.00581,"ranking_epss":0.68965,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28222","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28222"],"published_time":"2023-04-11T21:15:22","vendor":null,"product":null,"version":null},{"cve_id":"CVE-2023-28223","summary":"Windows  Domain Name Service Remote Code Execution Vulnerability","cvss":6.6,"cvss_version":3.0,"cvss_v2":null,"cvss_v3":6.6,"cvss_v4":null,"epss":0.02727,"ranking_epss":0.85969,"kev":false,"propose_action":null,"ransomware_campaign":null,"references":["https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28223","https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28223"],"published_time":"2023-04-11T21:15:22","vendor":null,"product":null,"version":null}]}