Page 3 of 17 results (0.012 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Micro-Star International (MSI) App Player <= 4.280.1.6309 is vulnerable to multiple Privilege Escalation (LPE/EoP) vulnerabilities in the NTIOLib_X64.sys and BstkDrv_msi2.sys drivers components. All the vulnerabilities are triggered by sending specific IOCTL requests. Micro-Star International (MSI) App Player versiones anteriores a 4.280.1.6309 incluyéndola, es vulnerable a múltiples vulnerabilidades de escalada de privilegios (LPE/EoP) en los componentes de los controladores NTIOLib_X64.sys y BstkDrv_msi2.sys. Todas las vulnerabilidades son desencadenadas mediante el envío de peticiones IOCTL específicas • https://voidsec.com https://voidsec.com/advisories/cve-2021-44900 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Micro-Star International (MSI) Center <= 1.0.31.0 is vulnerable to multiple Privilege Escalation vulnerabilities in the atidgllk.sys, atillk64.sys, MODAPI.sys, NTIOLib.sys, NTIOLib_X64.sys, WinRing0.sys, WinRing0x64.sys drivers components. All the vulnerabilities are triggered by sending specific IOCTL requests. Micro-Star International (MSI) Center versiones anteriores a 1.0.31.0 incluyéndola, es vulnerable a múltiples vulnerabilidades de escalada de privilegios en los componentes de los controladores atidgllk.sys, atillk64.sys, MODAPI.sys, NTIOLib.sys, NTIOLib_X64.sys, WinRing0.sys, WinRing0x64.sys. Todas las vulnerabilidades son desencadenadas mediante el envío de peticiones IOCTL específicas • https://voidsec.com https://voidsec.com/advisories/cve-2021-44899 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

MODAPI.sys in MSI Dragon Center 2.0.104.0 allows low-privileged users to access kernel memory and potentially escalate privileges via a crafted IOCTL 0x9c406104 call. This IOCTL provides the MmMapIoSpace feature for mapping physical memory. Un archivo MODAPI.sys en MSI Dragon Center versión 2.0.104.0, permite a usuarios poco privilegiados acceder a la memoria del kernel y potencialmente escalar privilegios por medio de una llamada IOCTL 0x9c406104 diseñada. Esta IOCTL proporciona la funcionalidad MmMapIoSpace para mapear la memoria física • https://github.com/rjt-gupta/CVE-2021-29337 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 3

The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request. El controlador MsIo64.sys versiones anteriores a 1.1.19.1016 en MSI Dragon Center versiones anteriores a 2.0.98.0, presenta un desbordamiento del búfer que permite una escalada de privilegios por medio de una petición diseñada de IOCTL 0x80102040, 0x80102044, 0x80102050 o 0x80102054 • https://github.com/mathisvickie/CVE-2021-27965 https://github.com/Jeromeyoung/CVE-2021-27965 https://github.com/fengjixuchui/CVE-2021-27965 https://github.com/kronl/cve/tree/master/MSI_Dragon_Center https://www.microsoft.com/en-us/p/msi-dragon-center/9nh7n2bv1cqq?activetab=pivot:overviewtab • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 6

The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054). El controlador MsIo64 de MSI AmbientLink versión 1.0.0.8, presenta un desbordamiento del búfer (0x80102040, 0x80102044, 0x80102050 y 0x80102054) MSI Ambient Link Driver version 1.0.0.8 suffers from a local privilege escalation vulnerability. • https://www.exploit-db.com/exploits/48836 https://github.com/uf0o/CVE-2020-17382 https://github.com/houseofxyz/CVE-2020-17382 http://packetstormsecurity.com/files/159315/MSI-Ambient-Link-Driver-1.0.0.8-Privilege-Escalation.html https://us.msi.com/support/download/vga https://www.coresecurity.com/core-labs/advisories/msi-ambient-link-multiple-vulnerabilities • CWE-787: Out-of-bounds Write •