Page 438 of 2398 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 1

Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 do not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Windows Task Management Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2528. Vulnerabilidad en Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10 no restringe adecuadamente los niveles de suplantación, lo que permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Windows Task Management Elevation of Privilege Vulnerability,' una vulnerabilidad diferente a CVE-2015-2528. The Microsoft\Windows\Shell\CreateObjectTask initializes a shell32 based ICreateObject COM server as local system. This is marked as being accessible from a normal user account so once created we can attach to it. The server only has one method, CreateObject which checks the CLSID against a list of known safe classes before allowing it to be instantiated. • https://www.exploit-db.com/exploits/38202 http://www.securitytracker.com/id/1033494 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-102 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 63%CPEs: 11EXPL: 0

Windows Journal in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows remote attackers to execute arbitrary code via a crafted .jnt file, aka "Windows Journal RCE Vulnerability," a different vulnerability than CVE-2015-2513 and CVE-2015-2530. Vulnerabilidad en Windows Journal en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10, permite a atacantes remotos ejecutar código arbitrario a través de un archivo .jnt manipulado, también conocido como 'Windows Journal RCE Vulnerability,' una vulnerabilidad diferente a CVE-2015-2513 y CVE-2015-2530. • http://www.securitytracker.com/id/1033484 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-098 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 1

The process-initialization implementation in win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." Vulnerabilidad en la implementación process-initialization en win32k.sys en los controladores kernel-mode en Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold and 8.1 y Windows 10, no restringe adecuadamente los niveles de suplantación, lo que permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Win32k Elevation of Privilege Vulnerability.' The NtUserGetClipboardAccessToken win32k system call exposes the access token of the last user to lower-privileged users. It can also be used to open an anonymous impersonation thread token which normally OpenThreadToken shouldn't be able to do. This is a bypass of the fix for CVE-2015-0078. • https://www.exploit-db.com/exploits/38199 http://www.securityfocus.com/bid/76599 http://www.securitytracker.com/id/1033485 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 68%CPEs: 11EXPL: 0

Integer overflow in Windows Journal in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows remote attackers to execute arbitrary code via a crafted .jnt file, aka "Windows Journal Integer Overflow RCE Vulnerability." Vulnerabilidad de desbordamiento de entero en Windows Journal en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10, permite a atacantes remotos ejecutar código arbitrario a través de un archivo .jnt manipulado, también conocido como 'Windows Journal Integer Overflow RCE Vulnerability.' • http://www.securitytracker.com/id/1033484 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-098 • CWE-190: Integer Overflow or Wraparound •

CVSS: 6.9EPSS: 0%CPEs: 12EXPL: 1

The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518. Vulnerabilidad en el controlador kernel-mode en Microsoft Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT Gold y 8.1 y Windows 10, permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como 'Win32k Memory Corruption Elevation of Privilege Vulnerability,' una vulnerabilidad diferente a CVE-2015-2511, CVE-2015-2517 y CVE-2015-2518. The kernel-mode driver in Microsoft Windows OS and Server allows local users to gain privileges via a crafted application. • https://github.com/k0keoyo/CVE-2015-2546-Exploit http://www.securityfocus.com/bid/76608 http://www.securitytracker.com/id/1033485 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-097 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •