Page 116 of 3007 results (0.007 seconds)

CVSS: 9.3EPSS: 20%CPEs: 20EXPL: 0

11 Sep 2020 —

An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine.

To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine. An attacker could then create a group policy to grant adminis... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1013 •

CVSS: 7.8EPSS: 2%CPEs: 20EXPL: 0

11 Sep 2020 —

An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or app... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1030 •

CVSS: 8.8EPSS: 11%CPEs: 17EXPL: 0

11 Sep 2020 —

An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

There are multiple ways an attacker could exploit the vulnerability:

  • In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1012 •

CVSS: 5.5EPSS: 1%CPEs: 24EXPL: 0

11 Sep 2020 — Microsoft Graphics Component Denial of Service Vulnerability Se presenta una vulnerabilidad de divulgación de información cuando el Microsoft Windows Graphics Component maneja inapropiadamente objetos en memoria, también se conoce como "Microsoft Graphics Component Information Disclosure Vulnerability". Este ID de CVE es diferente de CVE-2020-1083 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0921 •

CVSS: 9.3EPSS: 16%CPEs: 24EXPL: 0

11 Sep 2020 —

A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.

To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript.

The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.

Se presen... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0922 •
CVSS: 7.8EPSS: 0%CPEs: 24EXPL: 0

11 Sep 2020 —

An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows Function Discovery SSDP Provider handles memory.

Se presenta una vulnerabilidad de escalada de privilegios ... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0912 •
CVSS: 7.8EPSS: 0%CPEs: 24EXPL: 0

11 Sep 2020 —

An elevation of privilege vulnerability exists when Windows Modules Installer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.

An attacker could exploit this vulnerability by running a specially crafted application on the victim system.

The update addresses the vulnerability by correcting the way the Windows Modules Installer handles objects in memory.

Se presenta una vulnerabilidad de escala... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0911 •
CVSS: 7.5EPSS: 25%CPEs: 54EXPL: 0

11 Sep 2020 —

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then install pr... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0878 • CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 18%CPEs: 9EXPL: 0

11 Sep 2020 —

An information disclosure vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited this vulnerability would be able to read sensitive information about the target system.

To exploit this condition, an authenticated attacker would need to send a specially crafted request to the AD|DNS service. Note that the information disclosure vulnerability by itself would not be sufficient for an attacker to compromise ... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0856 •

CVSS: 7.8EPSS: 0%CPEs: 22EXPL: 0

11 Sep 2020 —

An elevation of privilege vulnerability exists when NTFS improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.

The security update addresses the vulnerability by correcting how NTFS checks access.

Se presenta una vulnerabilidad de escalada de pri... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0838 •