Page 435 of 2398 results (0.014 seconds)

CVSS: 9.3EPSS: 93%CPEs: 12EXPL: 0

Use-after-free vulnerability in Windows Shell in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows remote attackers to execute arbitrary code via a crafted toolbar object, aka "Toolbar Use After Free Vulnerability." Vulnerabilidad de uso después de liberación de memoria en Windows Shell en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 permite a atacantes remotos ejecutar código arbitrario a través de un objeto de la barra de herramientas manipulado, también conocida como 'Toolbar Use After Free Vulnerability.' • http://www.securitytracker.com/id/1033799 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-109 • CWE-416: Use After Free •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 1

The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Windows Object Reference Elevation of Privilege Vulnerability." El kernel en Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 permite a usuarios locales ganar privilegios a través de una aplicación manipulada, también conocido como 'Windows Object Reference Elevation of Privilege Vulnerability'. The NtCreateLowBoxToken API allows the capture of arbitrary handles which can lead to to local denial of service or elevation of privilege. • https://www.exploit-db.com/exploits/38580 http://www.securityfocus.com/bid/76998 http://www.securitytracker.com/id/1033805 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-111 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability." El kernel en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocido como 'Windows Elevation of Privilege Vulnerability'. • http://www.securitytracker.com/id/1033805 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-111 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 1

The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows physically proximate attackers to bypass the Trusted Boot protection mechanism, and consequently interfere with the integrity of code, BitLocker, Device Encryption, and Device Health Attestation, via a crafted Boot Configuration Data (BCD) setting, aka "Trusted Boot Security Feature Bypass Vulnerability." El kernel en Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 permite a atacantes físicamente próximos eludir el mecanismo de protección Trusted Boot y consecuentemente interferir con la integridad del código, BitLocker, Device Encryption y Device Health Attestation, a través de un ajuste Boot Configuration Data (BCD) manipulado, también conocido como 'Trusted Boot Security Feature Bypass Vulnerability'. An attacker with administrative access to a Windows machine with UEFI Secure Boot enabled may bypass code signing policy checks by putting intentionally-malformed configuration options in the boot configuration database (BCD). • http://packetstormsecurity.com/files/133962/Microsoft-Trusted-Boot-Security-Feature-Bypass.html http://www.securityfocus.com/archive/1/536678/100/0/threaded http://www.securitytracker.com/id/1033805 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-111 • CWE-254: 7PK - Security Features •

CVSS: 9.3EPSS: 63%CPEs: 11EXPL: 0

Windows Journal in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows remote attackers to execute arbitrary code via a crafted .jnt file, aka "Windows Journal RCE Vulnerability," a different vulnerability than CVE-2015-2514 and CVE-2015-2530. Vulnerabilidad en Windows Journal en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold and 8.1 y Windows 10, permite a atacantes remotos ejecutar código arbitrario a través de un archivo .jnt manipulado, también conocido como 'Windows Journal RCE Vulnerability,' una vulnerabilidad diferente a CVE-2015-2514 y CVE-2015-2530. • http://www.securitytracker.com/id/1033484 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-098 • CWE-20: Improper Input Validation •