Page 60 of 1100 results (0.015 seconds)

CVSS: 8.8EPSS: 1%CPEs: 8EXPL: 0

Windows DNS Server Remote Code Execution Vulnerability Una vulnerabilidad de Denegación de Servicio de Windows DNS Server. Este ID de CVE es diferente de CVE-2021-33745, CVE-2021-34444, CVE-2021-34499 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34442 •

CVSS: 5.5EPSS: 0%CPEs: 18EXPL: 0

GDI+ Information Disclosure Vulnerability Una vulnerabilidad de Divulgación de Información de GDI+ • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34440 •

CVSS: 7.8EPSS: 15%CPEs: 8EXPL: 0

Windows Font Driver Host Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Windows Font Driver Host • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34438 •

CVSS: 8.8EPSS: 1%CPEs: 5EXPL: 0

Windows DNS Server Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Windows DNS Server. Este ID de CVE es diferente de CVE-2021-33746, CVE-2021-33754, CVE-2021-33780, CVE-2021-34494 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34525 •

CVSS: 7.8EPSS: 0%CPEs: 18EXPL: 0

Win32k Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Win32k . Este ID de CVE es diferente de CVE-2021-34449 This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the cdd.dll driver. The issue results from dereferencing a NULL pointer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34516 https://www.zerodayinitiative.com/advisories/ZDI-21-1004 https://www.zerodayinitiative.com/advisories/ZDI-21-1005 https://www.zerodayinitiative.com/advisories/ZDI-21-1006 https://www.zerodayinitiative.com/advisories/ZDI-21-1007 https://www.zerodayinitiative.com/advisories/ZDI-21-1008 https://www.zerodayinitiative.com/advisories/ZDI-21-1009 https://www.zerodayinitiative.com/advisories/ZDI-21-1010 https://www.zerodayinitiati • CWE-20: Improper Input Validation •