Page 59 of 1646 results (0.011 seconds)

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

Windows Win32k Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows Win32k. Este ID de CVE es diferente de CVE-2021-26863, CVE-2021-26875, CVE-2021-26900 This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the win32kfull.sys driver. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077 https://www.zerodayinitiative.com/advisories/ZDI-21-287 https://www.zerodayinitiative.com/advisories/ZDI-21-403 https://www.zerodayinitiative.com/advisories/ZDI-21-482 https://www.zerodayinitiative.com/advisories/ZDI-21-494 https://www.zerodayinitiative.com/advisories/ZDI-21-495 https://www.zerodayinitiative.com/advisories/ZDI-21-496 https://www.zerodayinitiative.com/advisories/ZDI-21-497 https://www.zerodayinitiative. • CWE-269: Improper Privilege Management •

CVSS: 9.3EPSS: 0%CPEs: 4EXPL: 0

Windows 10 Update Assistant Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios del Update Assistant de Windows 10 This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windows Update Assistant. The issue results from incorrect permissions on a directory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of Administrator. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27070 https://www.zerodayinitiative.com/advisories/ZDI-21-329 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

Windows DNS Server Denial of Service Vulnerability Una Vulnerabilidad de Denegación de Servicio del Servidor DNS de Windows. Este ID de CVE es diferente de CVE-2021-26896 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27063 •

CVSS: 7.8EPSS: 0%CPEs: 23EXPL: 0

Windows Event Tracing Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Event Tracing de Windows. Este ID de CVE es diferente de CVE-2021-26872, CVE-2021-26898 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26901 •

CVSS: 8.8EPSS: 84%CPEs: 5EXPL: 0

Windows Win32k Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows Win32k. Este ID de CVE es diferente de CVE-2021-26863, CVE-2021-26875, CVE-2021-27077 This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within DirectComposition. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26900 https://www.zerodayinitiative.com/advisories/ZDI-21-331 • CWE-416: Use After Free •