Page 125 of 3060 results (0.038 seconds)

CVSS: 8.8EPSS: 2%CPEs: 20EXPL: 1

13 Aug 2020 — An elevation of privilege vulnerability exists in the Local Security Authority Subsystem Service (LSASS) when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause an elevation of privilege on the target system's LSASS service. The security update addresses the vulnerability by changing the way that LSASS handles specially crafted authentication requests. Se presenta una vulnerabilidad de elevación de privilegi... • https://packetstorm.news/files/id/158865 •

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 0

13 Aug 2020 — A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory. An attacker who successfully exploited the vulnerability would gain execution on a victim system. The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory. Se presenta una vulnerabilidad de ejecución de código remota cuando el Windows Font Driver Host maneja inapropiadamente la memoria. Un atacante que explotara con éxito la vulnerabilidad podría cons... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1520 •

CVSS: 7.8EPSS: 8%CPEs: 20EXPL: 9

13 Aug 2020 — An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. ... • https://packetstorm.news/files/id/160993 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 6.4EPSS: 0%CPEs: 32EXPL: 0

29 Jul 2020 — GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions. GRUB2 presenta un fallo al comprobar la firma del kernel cuando se inicia directamente sin cuña, permitiendo que el arranque seguro sea omitido. Esto solo afe... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00067.html • CWE-347: Improper Verification of Cryptographic Signature CWE-440: Expected Behavior Violation •

CVSS: 6.4EPSS: 0%CPEs: 33EXPL: 1

28 Jul 2020 — Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI ... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html • CWE-190: Integer Overflow or Wraparound CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 6.4EPSS: 0%CPEs: 36EXPL: 0

28 Jul 2020 — GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions. GRUB2 contiene una condición de carrera en la función grub_script_function_create() que conlleva a una vulnerabilidad de uso de la memoria previamente liberada la cual puede ser de... • http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

14 Jul 2020 — An elevation of privilege vulnerability exists in the way that the SharedStream Library handles objects in memory, aka 'Windows SharedStream Library Elevation of Privilege Vulnerability'. Se presenta una vulnerabilidad de elevación de privilegios en la manera en que la SharedStream Library maneja objetos en memoria, también se conoce como "Windows SharedStream Library Elevation of Privilege Vulnerability" • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1463 •

CVSS: 6.5EPSS: 14%CPEs: 20EXPL: 0

14 Jul 2020 — An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. Se presenta una vulnerabilidad de divulgación de información cuando el componente Windows GDI divulga inapropiadamente el contenido de su memoria, también se conoce como "Windows GDI Information Disclosure Vulnerability" • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1468 •

CVSS: 7.1EPSS: 0%CPEs: 25EXPL: 0

14 Jul 2020 — An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability'. Se presenta una vulnerabilidad de elevación de privilegios cuando el archivo MpSigStub.exe para Defender permite una eliminación de archivos en ubicaciones arbitrarias. Para explotar la vulnerabilidad, un atacante primero debe iniciar ses... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1461 •

CVSS: 4.3EPSS: 0%CPEs: 10EXPL: 0

14 Jul 2020 — An information disclosure vulnerability exists when Skype for Business is accessed via Microsoft Edge (EdgeHTML-based), aka 'Skype for Business via Microsoft Edge (EdgeHTML-based) Information Disclosure Vulnerability'. Se presenta una vulnerabilidad de divulgación de información cuando se accede a Skype for Business por medio de Microsoft Edge (EdgeHTML-based), también se conoce como "Skype for Business via Microsoft Edge (EdgeHTML-based) Information Disclosure Vulnerability" • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1462 •