Page 2 of 9 results (0.003 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 2

A vulnerability was found in FabulaTech Webcam for Remote Desktop 2.8.42. It has been classified as problematic. Affected is the function 0x222018 in the library ftwebcam.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. • https://drive.google.com/file/d/1_gVQtfbpywhh8Z6g4Y03Qg7UT3Aobz2e/view?usp=sharing https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1188 https://vuldb.com/?ctiid.222360 https://vuldb.com/?id.222360 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This issue affects some unknown processing in the library ftwebcam.sys of the component Global Variable Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. • https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1187 https://vuldb.com/?ctiid.222359 https://vuldb.com/?id.222359 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

A vulnerability has been found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This vulnerability affects the function 0x222010/0x222018 in the library ftwebcam.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. • https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1186 https://vuldb.com/?ctiid.222358 https://vuldb.com/?id.222358 • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

ftusbbus2.sys in FabulaTech USB for Remote Desktop through 2020-02-19 allows privilege escalation via crafted IoCtl code related to a USB HID device. La biblioteca ftusbbus2.sys en FabulaTech USB para Remote Desktop versiones hasta 19-02-2020, permite una escalada de privilegios por medio de un código IoCtl diseñado relacionado a un dispositivo USB HID • https://github.com/Sentinel-One/CVE-2020-9332 https://labs.sentinelone.com/click-from-the-backyard-cve-2020-9332 https://www.fabulatech.com •