Page 101 of 2879 results (0.014 seconds)

CVSS: 7.5EPSS: 0%CPEs: 37EXPL: 0

Windows TCP/IP Denial of Service Vulnerability Una vulnerabilidad de Denegación de Servicio de Windows TCP/IP • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36953 •

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 0

Windows HTTP.sys Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows HTTP.sys • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26442 •

CVSS: 8.8EPSS: 0%CPEs: 31EXPL: 0

Storage Spaces Controller Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios de Storage Spaces Controller. Este ID de CVE es diferente de CVE-2021-40478, CVE-2021-40488, CVE-2021-40489, CVE-2021-41345 This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the storport.sys driver. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26441 https://www.zerodayinitiative.com/advisories/ZDI-21-1157 • CWE-269: Improper Privilege Management •

CVSS: 8.8EPSS: 97%CPEs: 19EXPL: 28

<p>Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.</p> <p>An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. • https://github.com/lockedbyte/CVE-2021-40444 https://github.com/klezVirus/CVE-2021-40444 https://github.com/Edubr2020/CVE-2021-40444--CABless https://github.com/rfcxv/CVE-2021-40444-POC https://github.com/DarkSprings/CVE-2021-40444 https://github.com/ozergoker/CVE-2021-40444 https://github.com/k8gege/CVE-2021-40444 https://github.com/H0j3n/CVE-2021-40444 https://github.com/fengjixuchui/CVE-2021-40444-docx-Generate https://github.com/Phuong39/CVE-2021-40444-CAB https:& • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

Windows Print Spooler Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows Print Spooler. Este CVE ID es diferente de CVE-2021-38667, CVE-2021-38671 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40447 • CWE-269: Improper Privilege Management •