Page 66 of 2116 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

Windows App-V Overlay Filter Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios del Overlay Filter de Windows App-V • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26860 •

CVSS: 5.5EPSS: 0%CPEs: 19EXPL: 0

Windows Event Tracing Information Disclosure Vulnerability Una Vulnerabilidad de Divulgación de Información de Event Tracing de Windows • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24107 •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

DirectX Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de DirectX • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24095 • CWE-269: Improper Privilege Management •

CVSS: 9.3EPSS: 0%CPEs: 6EXPL: 0

Windows Error Reporting Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Error Reporting de Windows • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24090 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

Windows Update Stack Setup Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Stack Setup de Windows Update This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within Windows Setup. By creating a directory junction, an attacker can abuse Windows Setup to delete a file. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729 https://www.zerodayinitiative.com/advisories/ZDI-21-284 • CWE-269: Improper Privilege Management •