Page 3 of 1003 results (0.006 seconds)

CVSS: 5.0EPSS: 6%CPEs: 14EXPL: 0

OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via crafted input, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "OLE Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2417. El objeto OLE en Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, y Windows RT Gold y 8.1 permite a atacantes remotos obtener privilegios mediante una entrada especialmente diseñada para este fin, como se demuestra por una transición desde integridad baja hasta integridad media, error conocido como 'OLE Elevation of Privilege Vulnerability', una vulnerabilidad diferente de CVE-2015-2417. • http://www.securitytracker.com/id/1032906 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-075 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 6%CPEs: 14EXPL: 0

OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via crafted input, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "OLE Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2416. OLE en Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, y Windows RT Gold y 8.1 permite a atacantes remotos la escalada de privilegios a través de entrada manipulada, también conocida como 'Vulnerabilidad de Escalado de Provilegios OLE', una vulnerabilidad diferente a CVE-2015-2416. • http://www.securitytracker.com/id/1032906 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-075 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 0

The graphics component in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application that leverages an incorrect bitmap conversion, aka "Graphics Component EOP Vulnerability." El componente gráfico en Microsoft Windows Server 2003 SP2 y R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, y Windows RT Gold and 8.1, permite a usuarios locales obtener privilegios a través de una aplicación diseñada que aprovecha una conversión de mapas de bits incorrectos, error conocido como 'Graphics Component EOP Vulnerability.' • http://www.securitytracker.com/id/1032902 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-072 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 1

win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." win32k.sys en los controladores del modo kernel en Microsoft Windows Server 2003 SP2 y R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2 y Windows RT Gold y 8.1 permite a usuarios locales la escalada de privilegios a través de aplicaciones manipuladas, también conocida como 'Vulnerabilidad de Escalada de Privilegios Win32k'. The Microsoft Windows kernel suffers from a use-after-free vulnerability in UserCommitDesktopMemory. • https://www.exploit-db.com/exploits/38267 http://www.securitytracker.com/id/1032904 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-073 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 0

ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "ATMFD.DLL Memory Corruption Vulnerability." ATMFD.DLL en el Controlador de Adobe Type Manager Font en Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, y Windows RT Gold y 8.1 permite a usuarios locales escalar privilegios a través de una aplicación modificada, también conocida como “Vulnerabilidad de corrupción de Memoria en ATMFD.DLL.” ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server allows local users to gain privileges via a crafted application. • http://www.securityfocus.com/bid/75587 http://www.securitytracker.com/id/1032908 http://www.us-cert.gov/ncas/alerts/TA15-195A https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-077 • CWE-264: Permissions, Privileges, and Access Controls •