Page 184 of 2398 results (0.011 seconds)

CVSS: 5.5EPSS: 0%CPEs: 22EXPL: 0

An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory, aka 'Microsoft Graphics Component Information Disclosure Vulnerability'. Se presenta una vulnerabilidad de divulgación de información cuando el Microsoft Windows Graphics Component maneja inapropiadamente objetos en memoria, también se conoce como "Microsoft Graphics Component Information Disclosure Vulnerability" • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1160 •

CVSS: 8.8EPSS: 0%CPEs: 22EXPL: 0

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1247, CVE-2020-1251, CVE-2020-1253, CVE-2020-1310. Se presenta una vulnerabilidad de elevación de privilegios en Windows cuando el controlador del modo kernel de Windows presenta un fallo al manejar apropiadamente objetos en memoria, también se conoce como "Win32k Elevation of Privilege Vulnerability". Este ID de CVE es diferente de CVE-2020-1247, CVE-2020-1251, CVE-2020-1253, CVE-2020-1310 This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of palette objects. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1207 https://www.zerodayinitiative.com/advisories/ZDI-20-692 • CWE-416: Use After Free •

CVSS: 7.6EPSS: 1%CPEs: 29EXPL: 0

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'. Se presenta una vulnerabilidad de ejecución de código remota en la manera en que los navegadores de Microsoft acceden a objetos en memoria, también se conoce como "Microsoft Browser Memory Corruption Vulnerability" This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Intl object in JavaScript. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1219 https://www.zerodayinitiative.com/advisories/ZDI-20-698 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 8.8EPSS: 1%CPEs: 22EXPL: 0

A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1238. Se presenta una vulnerabilidad de corrupción de la memoria cuando Windows Media Foundation maneja inapropiadamente objetos en memoria, también se conoce como "Media Foundation Memory Corruption Vulnerability". Este ID de CVE es diferente de CVE-2020-1238 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the mpg2splt.ax module. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1239 https://www.zerodayinitiative.com/advisories/ZDI-20-697 • CWE-20: Improper Input Validation CWE-191: Integer Underflow (Wrap or Wraparound) CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 220EXPL: 1

The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue. La especificación UPnP de Open Connectivity Foundation antes del 17-04-2020 no prohíbe la aceptación de una petición de suscripción con una URL de entrega en un segmento de red diferente a la URL de suscripción de evento totalmente calificada, también se conoce como el problema de CallStranger • https://github.com/yunuscadirci/CallStranger http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html http://www.openwall.com/lists/oss-security/2020/06/08/2 https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek https://github.com/corelight/callstranger-detector https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html https://lists.debian.org/debian-l • CWE-276: Incorrect Default Permissions CWE-918: Server-Side Request Forgery (SSRF) •