Page 357 of 2398 results (0.012 seconds)

CVSS: 8.1EPSS: 17%CPEs: 12EXPL: 0

The Windows NetBT Session Services component on Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to maintain certain sequencing requirements, aka "NetBIOS Remote Code Execution Vulnerability". El componente Windows NetBT Session Services en Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607 y 1703 y Windows Server 2016 permite que se origine una vulnerabilidad de ejecución remota de código cuando fracasa a la hora de mantener ciertos requerimientos secuenciales. Esto también se conoce como "NetBIOS Remote Code Execution Vulnerability". • http://www.securityfocus.com/bid/100728 http://www.securitytracker.com/id/1039318 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0161 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.3EPSS: 1%CPEs: 21EXPL: 0

Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to obtain information to further compromise a user's system via a specially crafted document or an untrusted webpage, aka "Graphics Component Information Disclosure Vulnerability." El componente Uniscribe de Windows en Microsoft Windows Server 2008 SP2 y R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold y R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703 y Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office para Mac 2011 y 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; y Live Meeting 2007 Add-in y Console permite que un atacante obtenga información para comprometer posteriormente el sistema de un usuario mediante un documento especialmente manipulado o una página web no fiable. Esto también se conoce como "Graphics Component Information Disclosure Vulnerability". • http://www.securityfocus.com/bid/100773 http://www.securitytracker.com/id/1039344 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8695 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 0%CPEs: 8EXPL: 0

Microsoft Bluetooth Driver in Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703 allows a spoofing vulnerability due to Microsoft's implementation of the Bluetooth stack, aka "Microsoft Bluetooth Driver Spoofing Vulnerability". Microsoft Bluetooth Driver en Windows Server 2008 SP2; Windows 7 SP1; Windows 8.1; Windows RT 8.1 y Windows 10 Gold, 1511, 1607 y 1703 permite que se produzca una vulnerabilidad de suplantación debido a la implementación de la pila Bluetooth por parte de Microsoft. Esto también se conoce como "Microsoft Bluetooth Driver Spoofing Vulnerability". • http://www.securityfocus.com/bid/100744 http://www.securitytracker.com/id/1039339 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8628 •

CVSS: 7.0EPSS: 0%CPEs: 12EXPL: 0

The Windows Kernel-Mode Drivers component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability".. This CVE ID is unique from CVE-2017-8720. El componente Windows Kernel-Mode Drivers en Windows Server 2008 SP2 y R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold y R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607 y 1703; y Windows Server 2016 permite que se produzca una vulnerabilidad de elevación de privilegios cuando el componente Win32k gestiona incorrectamente objetos en la memoria. Esto también se conoce como "Win32k Elevation of Privilege Vulnerability". El ID de este CVE es distinto a CVE-2017-8720. • http://www.securityfocus.com/bid/100752 http://www.securitytracker.com/id/1039325 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8675 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 12EXPL: 0

The Windows GDI+ component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly discloses kernel memory addresses, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8680, CVE-2017-8681, and CVE-2017-8687. El componente GDI+ de Windows en Microsoft Windows Server 2008 SP2 y R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold y R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607 y 1703 y Windows Server 2016 permite que se produzca una vulnerabilidad de divulgación de información cuando revela de manera incorrecta direcciones de la memoria del kernel. Esto también se conoce como "Win32k Information Disclosure Vulnerability". El ID de este CVE es diferente de CVE-2017-8678, CVE-2017-8680, CVE-2017-8681 y CVE-2017-8687. • http://www.securityfocus.com/bid/100767 http://www.securitytracker.com/id/1039338 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8677 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •