CVE-2021-36966 – Windows Subsystem for Linux Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-36966
Windows Subsystem for Linux Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Windows Subsystem for Linux • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36966 • CWE-269: Improper Privilege Management •
CVE-2021-36965 – Windows WLAN AutoConfig Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-36965
Windows WLAN AutoConfig Service Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota en Windows WLAN AutoConfig Service • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36965 •
CVE-2021-36964 – Windows Event Tracing Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-36964
Windows Event Tracing Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows Event Tracing. Este CVE ID es diferente de CVE-2021-38630 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36964 • CWE-269: Improper Privilege Management •
CVE-2021-36963 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2021-36963
Windows Common Log File System Driver Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows Common Log File System Driver. Este CVE ID es diferente de CVE-2021-36955, CVE-2021-38633 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36963 • CWE-269: Improper Privilege Management •
CVE-2021-36962 – Windows Installer Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2021-36962
Windows Installer Information Disclosure Vulnerability Una Vulnerabilidad de Divulgación de Información de Windows Installer This vulnerability allows local attackers to disclose sensitive information on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windows Installer Service. By creating a directory junction, an attacker can abuse the service to disclose the contents of arbitrary files. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36962 https://www.zerodayinitiative.com/advisories/ZDI-21-1103 •