Page 65 of 1646 results (0.011 seconds)

CVSS: 9.9EPSS: 2%CPEs: 6EXPL: 0

Windows Hyper-V Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota de Windows Hyper-V • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26867 •

CVSS: 7.1EPSS: 0%CPEs: 12EXPL: 0

Windows Update Service Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios del Update Service de Windows This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within Windows Update Agent. By creating a directory junction, an attacker can abuse Windows Update Agent to delete a directory. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866 https://www.zerodayinitiative.com/advisories/ZDI-21-286 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 1

Windows Win32k Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows Win32k. Este ID de CVE es diferente de CVE-2021-26875, CVE-2021-26900, CVE-2021-27077 Microsoft Windows kernel suffers from a use-after-free of the PDEVOBJ object via a race condition vulnerability in NtGdiGetDeviceCapsAll. • http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

Windows Installer Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows Installer This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windows Installer Service. By creating a directory junction, an attacker can abuse the service to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862 https://www.zerodayinitiative.com/advisories/ZDI-21-285 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 1%CPEs: 19EXPL: 0

Windows Graphics Component Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota del Graphics Component de Windows • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26861 •