Page 121 of 2879 results (0.015 seconds)

CVSS: 6.5EPSS: 0%CPEs: 36EXPL: 0

Windows DCOM Server Security Feature Bypass Omisión de la Funcionalidad de Seguridad en Windows DCOM Server Kerberos supports a security buffer to set the target SPN of a ticket bypassing the SPN check in LSASS. • http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26414 •

CVSS: 9.3EPSS: 96%CPEs: 16EXPL: 30

Windows Print Spooler Remote Code Execution Vulnerability Una vulnerabilidad de Escalada de Privilegios de Windows Print Spooler Microsoft Windows Print Spooler contains an unspecified vulnerability that allows for remote code execution. • https://github.com/afwu/PrintNightmare https://github.com/cube0x0/CVE-2021-1675 https://github.com/calebstewart/CVE-2021-1675 https://github.com/hlldz/CVE-2021-1675-LPE https://github.com/LaresLLC/CVE-2021-1675 https://github.com/evilashz/CVE-2021-1675-LPE-EXP https://github.com/corelight/CVE-2021-1675 https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675 https://github.com/puckiestyle/CVE-2021-1675 https:// •

CVSS: 8.8EPSS: 1%CPEs: 19EXPL: 0

OLE Automation Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de OLE Automation • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31194 •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

Windows SSDP Service Elevation of Privilege Vulnerability Una vulnerabilidad de Escalada de Privilegios de Windows SSDP Service • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31193 •

CVSS: 7.8EPSS: 86%CPEs: 19EXPL: 0

Windows Graphics Component Elevation of Privilege Vulnerability Una vulnerabilidad de Escalada de Privilegios de Windows Graphics Component. Este ID de CVE es diferente de CVE-2021-31170 This vulnerability allows local attackers to disclose sensitive information on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of Font Entry objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31188 https://www.zerodayinitiative.com/advisories/ZDI-21-577 • CWE-416: Use After Free •