Page 253 of 2398 results (0.021 seconds)

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to ALPC. Existe una vulnerabilidad de elevación de privilegios cuando Windows maneja apropiadamente las llamadas hacia Advanced Local Procedure Call (ALPC). Un atacante que ha explotado con éxito esta vulnerabilidad podría ejecutar código arbitrario en el contexto de seguridad del sistema local, también se conoce como "Windows ALPC Elevation of Privilege Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1162 • CWE-269: Improper Privilege Management •

CVSS: 5.5EPSS: 0%CPEs: 20EXPL: 1

An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The update addresses the vulnerability by correcting the way in which the Windows Graphics Component handles objects in memory. Existe una vulnerabilidad de divulgación de información cuando el Componente Graphics de Microsoft Windows maneja inapropiadamente los objetos en la memoria, también se conoce como "Microsoft Graphics Component Information Disclosure Vulnerability". El ID de este CVE es diferente de CVE-2019-1078, CVE-2019-1148. Microsoft Font Subsetting DLL suffers from a heap-based out-of-bounds read vulnerability in FixSbitSubTableFormat1. • https://www.exploit-db.com/exploits/47269 http://packetstormsecurity.com/files/154098/Microsoft-Font-Subsetting-DLL-FixSbitSubTableFormat1-Out-Of-Bounds-Read.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1153 • CWE-125: Out-of-bounds Read •

CVSS: 4.3EPSS: 0%CPEs: 15EXPL: 0

An information disclosure vulnerability exists in Azure Active Directory (AAD) Microsoft Account (MSA) during the login request session. An attacker who successfully exploited the vulnerability could take over a user's account. To exploit the vulnerability, an attacker would have to trick a user into browsing to a specially crafted website, allowing the attacker to steal the user's token. The security update addresses the vulnerability by correcting how MSA handles cookies. Existe una vulnerabilidad de divulgación de información en Microsoft Account (MSA) de Azure Active Directory (AAD), durante la sesión de una petición de inicio de sesión, también se conoce como "Windows Information Disclosure Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1172 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory. Existe una vulnerabilidad de elevación de privilegios cuando el kernel de Windows no puede manejar apropiadamente los objetos en la memoria, también se conoce como "Windows Kernel Elevation of Privilege Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1164 • CWE-1260: Improper Handling of Overlap Between Protected Memory Ranges •

CVSS: 9.3EPSS: 12%CPEs: 18EXPL: 1

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. • https://www.exploit-db.com/exploits/47268 http://packetstormsecurity.com/files/154096/Microsoft-Font-Subsetting-DLL-MakeFormat12MergedGlyphList-Heap-Corruption.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1152 • CWE-787: Out-of-bounds Write •