Page 6 of 967 results (0.007 seconds)

CVSS: 9.8EPSS: 3%CPEs: 20EXPL: 0

Windows Encrypting File System (EFS) Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Windows Encrypting File System (EFS) • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43217 •

CVSS: 6.8EPSS: 2%CPEs: 36EXPL: 0

Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability Una vulnerabilidad de Divulgación de Información en Microsoft Local Security Authority Server (lsasrv) • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43216 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 9.8EPSS: 2%CPEs: 36EXPL: 0

iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution Una vulnerabilidad de corrupción de memoria de iSNS Server puede conllevar a una Ejecución de Código Remota • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43215 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 36EXPL: 0

Windows Common Log File System Driver Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios de Windows Common Log File System Driver. Este ID de CVE es diferente de CVE-2021-43226 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43207 •

CVSS: 7.8EPSS: 0%CPEs: 35EXPL: 0

Windows Print Spooler Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Windows Print Spooler This vulnerability allows local attackers to escape the low integrity sandbox on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Print Spooler service. The service can be abused to create an arbitrary file. An attacker can leverage this vulnerability to execute code in the context of the current user at medium integrity. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41333 https://www.zerodayinitiative.com/advisories/ZDI-21-1552 •