Page 67 of 1982 results (0.031 seconds)

CVSS: 5.5EPSS: 0%CPEs: 19EXPL: 0

Windows Event Tracing Information Disclosure Vulnerability Una Vulnerabilidad de Divulgación de Información de Event Tracing de Windows • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24107 •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

DirectX Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de DirectX • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24095 • CWE-269: Improper Privilege Management •

CVSS: 9.3EPSS: 0%CPEs: 6EXPL: 0

Windows Error Reporting Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Error Reporting de Windows • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24090 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

Windows Update Stack Setup Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Stack Setup de Windows Update This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within Windows Setup. By creating a directory junction, an attacker can abuse Windows Setup to delete a file. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1729 https://www.zerodayinitiative.com/advisories/ZDI-21-284 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

Windows Print Spooler Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Print Spooler de Windows. Este ID de CVE es diferente de CVE-2021-26878 This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Print Spooler service. By creating a directory junction, an attacker can abuse the Print Spooler service to delete a file. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1640 https://www.zerodayinitiative.com/advisories/ZDI-21-493 • CWE-269: Improper Privilege Management •