Page 21 of 198 results (0.106 seconds)

CVSS: 7.8EPSS: 58%CPEs: 12EXPL: 2

The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." Los controladores del modo kernel en Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows versión 8.1, Windows Server 2012 versión Gold y R2, Windows RT versión 8.1, Windows 10 versión Gold, 1511, 1607, 1703 y Windows Server 2016 de Microsoft, permiten a los usuarios locales alcanzar privilegios por medio de una aplicación diseñada, también se conoce como "Win32k Elevation of Privilege Vulnerability" Microsoft Win32k contains a privilege escalation vulnerability due to the Windows kernel-mode driver failing to properly handle objects in memory. • https://www.exploit-db.com/exploits/44478 http://www.securityfocus.com/bid/98258 http://www.securitytracker.com/id/1038449 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0263 https://xiaodaozhi.com/exploit/117.html • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 1

An example affected driver is Realtek Audio Driver 6.0.1.7898 on a Lenovo P50. ... Un ejemplo de controlador afectado es el Realtek Audio Driver 6.0.1.7898 en un Lenovo P50. • https://www.exploit-db.com/exploits/41933 https://bugs.chromium.org/p/project-zero/issues/detail?id=1075 • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

The process hardening implemented by the VirtualBox driver can be circumvented to load arbitrary code inside a VirtualBox process giving access to the VBoxDrv driver which can allow routes to elevation of privilege from a normal user. • https://www.exploit-db.com/exploits/41908 http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html http://www.securityfocus.com/bid/97732 http://www.securitytracker.com/id/1038288 • CWE-295: Improper Certificate Validation •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) implementation of the SubmitCommandVirtual DDI (DxgkDdiSubmitCommandVirtual) where untrusted input is used to reference memory outside of the intended boundary of the buffer leading to denial of service or escalation of privileges. Todas las versiones de NVIDIA Windows GPU Display Driver contienen una vulnerabilidad en la implementación de la capa de modo kernel (nvlddmkm.sys) del SubmitCommandVirtual DDI (DxgkDdiSubmitCommandVirtual) donde una entrada no confiable se utiliza para hacer referencia a memoria fuera del límite previsto del búfer conduciendo a denegación de servicio o escalada de privilegios. • https://www.exploit-db.com/exploits/41365 http://nvidia.custhelp.com/app/answers/detail/a_id/4398 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscapeID 0x100008b where user provided input is used as the limit for a loop may lead to denial of service or potential escalation of privileges Todas las versiones de NVIDIA Windows GPU Display Driver contienen una vulnerabilidad en el controlador de la capa del modo kernel (nvlddmkm.sys) para DxgkDdiEscapeID 0x100008b, donde la entrada proporcionada por el usuario se utiliza como límite para un bucle, puede dar lugar a una denegación de servicio o a una potencial escalada de privilegios. • https://www.exploit-db.com/exploits/41364 http://nvidia.custhelp.com/app/answers/detail/a_id/4398 • CWE-20: Improper Input Validation •