CVE-2021-24095 – DirectX Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-24095
DirectX Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de DirectX • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24095 • CWE-269: Improper Privilege Management •
CVE-2021-24090 – Windows Error Reporting Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-24090
Windows Error Reporting Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Error Reporting de Windows • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24090 • CWE-269: Improper Privilege Management •
CVE-2021-1729 – Windows Update Stack Setup Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-1729
Windows Update Stack Setup Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Stack Setup de Windows Update This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within Windows Setup. By creating a directory junction, an attacker can abuse Windows Setup to delete a file. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729 https://www.zerodayinitiative.com/advisories/ZDI-21-284 • CWE-269: Improper Privilege Management •
CVE-2021-1640 – Windows Print Spooler Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-1640
Windows Print Spooler Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Print Spooler de Windows. Este ID de CVE es diferente de CVE-2021-26878 This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Print Spooler service. By creating a directory junction, an attacker can abuse the Print Spooler service to delete a file. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1640 https://www.zerodayinitiative.com/advisories/ZDI-21-493 • CWE-269: Improper Privilege Management •
CVE-2021-26864 – Windows Virtual Registry Provider Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-26864
Windows Virtual Registry Provider Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios del Virtual Registry Provider de Windows Microsoft Windows Containers Host Registry Virtual Registry Provider does not correctly handle relative opens leading to a process in a server silo being able to access the host registry leading to elevation of privilege. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26864 •