Page 434 of 2398 results (0.011 seconds)

CVSS: 9.3EPSS: 15%CPEs: 13EXPL: 2

The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Memory Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-6103. Adobe Type Manager Library en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 Gold y 1511 permite a atacantes remotos ejecutar código arbitrario a través de una fuente embebida manipulada, también conocida como 'Windows Graphics Memory Remote Code Execution Vulnerability', una vulnerabilidad diferente a CVE-2015-6103. A number of Windows kernel crashes in the win32k.sys driver exist while processing a specific corrupted TTF font file. This finding documents an overflow with a malformed TrueType program. • https://www.exploit-db.com/exploits/38713 http://packetstormsecurity.com/files/134398/Microsoft-Windows-Kernel-Win32k.sys-TTF-Font-Processing-Buffer-Overflow.html http://www.securitytracker.com/id/1034114 https://code.google.com/p/google-security-research/issues/detail?id=507 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115 • CWE-20: Improper Input Validation •

CVSS: 6.9EPSS: 0%CPEs: 13EXPL: 1

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-6100. El kernel en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 Gold y 1511 permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Windows Kernel Memory Elevation of Privilege Vulnerability', una vulnerabilidad diferente a CVE-2015-6100. • https://www.exploit-db.com/exploits/38795 http://www.securitytracker.com/id/1034114 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.8EPSS: 0%CPEs: 11EXPL: 0

SChannel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 lacks the required extended master-secret binding support to ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a "triple handshake attack," aka "Schannel TLS Triple Handshake Vulnerability." SChannel en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2 y Windows RT Gold y 8.1 carece de la admisión de enlazado secreto-maestro extendido requerida para asegurarse de que un certificado de servidor X.509 es el mismo durante la renegociación que como era antes de la renegociación, lo que permite a atacantes man-in-the-middle obtener información sensible o modificar datos de sesión TLS a través de un 'triple handshake attack', también conocida como 'Schannel TLS Triple Handshake Vulnerability'. • http://www.securitytracker.com/id/1034124 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-121 • CWE-20: Improper Input Validation CWE-310: Cryptographic Issues •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 1

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles junctions during mountpoint creation, which makes it easier for local users to gain privileges by leveraging certain sandbox access, aka "Windows Mount Point Elevation of Privilege Vulnerability." El kernel en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 no maneja correctamente las uniones durante la creación del punto de montaje, lo que hace más fácil a usuarios locales obtener privilegios aprovechando cierto acceso a la sandbox, también conocido como 'Windows Mount Point Elevation of Privilege Vulnerability'. A mitigation added to Windows 10 to prevent NTFS Mount Reparse Points being created at integrity levels below medium can be bypassed. • https://www.exploit-db.com/exploits/38474 http://packetstormsecurity.com/files/133971/Windows-Sandboxed-Mount-Reparse-Point-Creation-Mitigation-Bypass.html http://www.securitytracker.com/id/1033805 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-111 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability." El kernel en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocido como 'Windows Kernel Memory Corruption Vulnerability'. • http://www.securitytracker.com/id/1033805 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-111 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •