Page 124 of 3060 results (0.017 seconds)

CVSS: 7.8EPSS: 2%CPEs: 20EXPL: 0

17 Aug 2020 — A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by corre... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1379 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 79%CPEs: 17EXPL: 1

17 Aug 2020 — A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take con... • https://packetstorm.news/files/id/163056 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 1

17 Aug 2020 — An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory. Se presenta una vulnerabilidad de ele... • https://packetstorm.news/files/id/158938 •

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 1

17 Aug 2020 — An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory. Se presenta una vulnerabilidad de ele... • https://packetstorm.news/files/id/158939 • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 5%CPEs: 20EXPL: 0

17 Aug 2020 — A remote code execution vulnerability exists when Windows Media Audio Codec improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Audio Codec handles objects. Se present... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1339 •

CVSS: 9.3EPSS: 2%CPEs: 22EXPL: 0

17 Aug 2020 — A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system. To exploit the vulnerability, an attacker would need to be able to upload a specially crafted file to a web application. The security update addresses the vulnerability by correcting how .NET Framework processes input. Se presenta una vulnerabilidad de ejecución de código remota cuando Microsoft .NET Framework procesa ... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1046 •

CVSS: 8.8EPSS: 0%CPEs: 20EXPL: 0

14 Aug 2020 — A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by corre... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1492 • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 10%CPEs: 15EXPL: 0

14 Aug 2020 — A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory. Se presenta una vulnerabilidad de ejecución de código remota en la manera en que Micr... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1561 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

13 Aug 2020 — An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows WalletService properly handles objects in memory. Se presenta una vulnerabilidad de elevación de privilegios en la ... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1556 •

CVSS: 7.8EPSS: 3%CPEs: 21EXPL: 0

13 Aug 2020 — An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1577 •