Page 136 of 2116 results (0.008 seconds)

CVSS: 8.8EPSS: 7%CPEs: 20EXPL: 0

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Windows Font Library Remote Code Execution Vulnerability'. Se presenta una vulnerabilidad de ejecución de código remota cuando Windows Font Library maneja inapropiadamente fuentes especialmente diseñadas. Para todos los sistemas, excepto Windows 10, un atacante que haya explotado con éxito la vulnerabilidad podría ejecutar código remotamente, también se conoce como "Windows Font Library Remote Code Execution Vulnerability" This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the parsing of fonts. Crafted data in a font can trigger a write past the end of a heap-based buffer. • http://www.openwall.com/lists/oss-security/2020/08/25/3 http://www.openwall.com/lists/oss-security/2020/08/25/5 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1436 https://www.zerodayinitiative.com/advisories/ZDI-20-877 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 0

An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory, aka 'Windows Network Location Awareness Service Elevation of Privilege Vulnerability'. Se presenta una vulnerabilidad de elevación de privilegios en la manera en que el Windows Network Location Awareness Service maneja objetos en memoria, también se conoce como "Windows Network Location Awareness Service Elevation of Privilege Vulnerability" • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1437 •

CVSS: 9.3EPSS: 4%CPEs: 20EXPL: 0

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'. Se presenta una vulnerabilidad de ejecución de código remota en la manera en que la Windows Graphics Device Interface (GDI) maneja objetos en memoria, también se conoce como "GDI+ Remote Code Execution Vulnerability" • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1435 •

CVSS: 5.3EPSS: 0%CPEs: 13EXPL: 0

An elevation of privilege vulnerability exists in the way that the Windows Sync Host Service handles objects in memory, aka 'Windows Sync Host Service Elevation of Privilege Vulnerability'. Se presenta una vulnerabilidad de elevación de privilegios en la manera en que el Windows Sync Host Service maneja objetos en memoria, también se conoce como "Windows Sync Host Service Elevation of Privilege Vulnerability" • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1434 •

CVSS: 6.5EPSS: 11%CPEs: 11EXPL: 0

An information disclosure vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory, aka 'Microsoft Edge PDF Information Disclosure Vulnerability'. Se presenta una vulnerabilidad de divulgación de información cuando Microsoft Edge PDF Reader maneja inapropiadamente objetos en memoria, también se conoce como "Microsoft Edge PDF Information Disclosure Vulnerability" • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1433 •