Page 433 of 2398 results (0.009 seconds)

CVSS: 6.9EPSS: 0%CPEs: 13EXPL: 2

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6101. El kernel en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 Gold y 1511 permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Windows Kernel Memory Elevation of Privilege Vulnerability', una vulnerabilidad diferente a CVE-2015-6101. The Microsoft Windows kernel suffers from a use-after-free vulnerability with device contexts and NtGdiSelectBitmap. • https://www.exploit-db.com/exploits/38796 http://www.securitytracker.com/id/1034114 https://blog.fortinet.com/2016/08/17/root-cause-analysis-of-windows-kernel-uaf-vulnerability-lead-to-cve-2016-3310 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

The kernel in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability." El kernel en Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1 y Windows 10 Gold y 1511 permite a usuarios locales eludir el mecanismo de protección KASLR, y en consecuencia descubrir una dirección base de driver, a través de una aplicación manipulada, también conocida como 'Windows Kernel Memory Information Disclosure Vulnerability'. • http://www.securitytracker.com/id/1034114 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 0

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application that triggers a Winsock call referencing an invalid address, aka "Winsock Elevation of Privilege Vulnerability." Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 Gold y 1511 permite a usuarios locales obtener privilegios a través de una aplicación manipulada que desencadena una llamada Winsock referenciando una dirección no válida, también conocida como 'Winsock Elevation of Privilege Vulnerability'. • http://www.securitytracker.com/id/1034121 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-119 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 13EXPL: 0

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass intended filesystem permissions by leveraging Low Integrity access, aka "Windows Kernel Security Feature Bypass Vulnerability." El kernel en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 Gold y 1511 permite a usuarios locales eludir permisos de archivo de sistema previstos aprovechándose del acceso Low Integrity, también conocida como 'Windows Kernel Security Feature eludir Vulnerability'. • http://www.securitytracker.com/id/1034114 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115 • CWE-254: 7PK - Security Features •

CVSS: 9.3EPSS: 15%CPEs: 13EXPL: 2

The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Memory Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-6104. Adobe Type Manager Library en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 Gold y 1511 permite a atacantes remotos ejecutar código arbitrario a través de una fuente embebida manipulada, también conocida como 'Windows Graphics Memory Remote Code Execution Vulnerability', una vulnerabilidad diferente a CVE-2015-6104. A number of Windows kernel crashes in the win32k.sys driver exist while processing a specific corrupted TTF font file. This finding documents an overflow with a malformed OS/2 table. • https://www.exploit-db.com/exploits/38714 http://packetstormsecurity.com/files/134397/Microsoft-Windows-Kernel-Win32k.sys-TTF-Font-Processing-Buffer-Overflow.html http://www.securitytracker.com/id/1034114 https://code.google.com/p/google-security-research/issues/detail?id=506 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115 • CWE-20: Improper Input Validation •