Page 2 of 23 results (0.009 seconds)

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

Microsoft Defender Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Defender • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42298 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Microsoft Windows Defender Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Microsoft Windows Defender This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within Windows Defender. By creating a directory junction, an attacker can abuse Windows Defender to delete a file. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34471 • CWE-269: Improper Privilege Management •

CVSS: 9.3EPSS: 1%CPEs: 1EXPL: 0

Microsoft Defender Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Defender. Este ID de CVE es diferente de CVE-2021-34464 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34522 •

CVSS: 8.8EPSS: 2%CPEs: 1EXPL: 0

Microsoft Defender Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Microsoft Defender ASProtect embeds a runtime DLL that is susceptible to memory corruption. Crash testcase provided. • http://packetstormsecurity.com/files/163443/MpEngine-ASProtect-Embedded-Runtime-DLL-Memory-Corruption.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31985 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Microsoft Defender Denial of Service Vulnerability Una vulnerabilidad de Denegación de Servicio en Microsoft Defender • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31978 •