Page 411 of 2398 results (0.014 seconds)

CVSS: 4.9EPSS: 0%CPEs: 11EXPL: 0

The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows local users to bypass the ASLR protection mechanism via a crafted application, aka "GDI Information Disclosure Vulnerability." La Graphics Device Interface (GDI) en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT 8.1 y Windows 10 Gold, 1511 y 1607 permite a usuarios locales eludir el mecanismo de protección ASLR a través de una aplicación manipulada, vulnerabilidad también conocida como "GDI Information Disclosure Vulnerability". This vulnerability allows local attackers to leak sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the NtGdiQueryFonts function. The issue lies in the failure to sanitize a buffer before returning its contents resulting in the leak of a kernel address. • http://www.securityfocus.com/bid/92784 http://www.securitytracker.com/id/1036786 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-106 • CWE-254: 7PK - Security Features •

CVSS: 6.5EPSS: 70%CPEs: 18EXPL: 1

Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to obtain sensitive information via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability." Microsoft Internet Explorer 9 hasta la versión 11 y Microsoft Edge permiten a atacantes remotos obtener información sensible a través de un sitio web manipulado, vulnerabilidad también conocida como "Microsoft Browser Information Disclosure Vulnerability". An information disclosure vulnerability exists in the way that certain functions in Internet Explorer and Edge handle objects in memory. The vulnerability could allow an attacker to detect specific files on the user's computer. • http://www.securityfocus.com/bid/92788 http://www.securitytracker.com/id/1036788 http://www.securitytracker.com/id/1036789 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-104 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-105 https://www.brokenbrowser.com/detecting-apps-mimetype-malware •

CVSS: 5.5EPSS: 0%CPEs: 11EXPL: 1

The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 does not properly implement registry access control, which allows local users to obtain sensitive account information via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability." La API del kernel en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT 8.1 y Windows 10 Gold, 1511 y 1607 no implementa adecuadamente el control de acceso al registro, lo que permite a usuarios locales obtener información sensible de cuentas a través de una aplicación manipulada, vulnerabilidad también conocida como "Windows Kernel Elevation of Privilege Vulnerability". RegLoadAppKey is documented to load keys in a location which can't be enumerated and also non-guessable. However it's possible to enumerate loaded hives and find ones which can be written to which might lead to elevation of privilege. • https://www.exploit-db.com/exploits/40430 http://www.securityfocus.com/bid/92845 http://www.securitytracker.com/id/1036802 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-111 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.5EPSS: 53%CPEs: 8EXPL: 0

The PDF library in Microsoft Edge, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information via a crafted web site, aka "PDF Library Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3374. La librería PDF en Microsoft Edge, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT 8.1 y Windows 10 Gold, 1511 y 1607 permite a atacantes remotos obtener información sensible a través de un sitio web manipulado, vulnerabilidad también conocida como "PDF Library Information Disclosure Vulnerability", una vulnerabilidad diferente a CVE-2016-3374. • http://www.securityfocus.com/bid/92839 http://www.securitytracker.com/id/1036789 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-105 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-115 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

The Netlogon service in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1 improperly establishes secure communications channels, which allows local users to gain privileges by leveraging access to a domain-joined machine, aka "Netlogon Elevation of Privilege Vulnerability." El servicio Netlogon en Microsoft Windows 8.1, Windows Server 2012 Gold y R2 y Windows RT 8.1 no establece correctamente canales de comunicación seguros, lo que permite a usuarios locales obtener privilegios aprovechando el acceso a una máquina de dominio unido, también conocida como "Netlogon Elevation of Privilege Vulnerability". • http://www.securityfocus.com/bid/92296 http://www.securitytracker.com/id/1036576 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-101 • CWE-264: Permissions, Privileges, and Access Controls •