Page 7 of 90 results (0.040 seconds)

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

.NET Denial of Service Vulnerability Una Vulnerabilidad de Denegación de Servicio en .NET A vulnerability was found in dotnet’s ASP.NET Core Krestel when pooling HTTP/2 and HTTP/3 headers. This flaw allows a remote, unauthenticated attacker to cause a denial of service. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21986 https://access.redhat.com/security/cve/CVE-2022-21986 https://bugzilla.redhat.com/show_bug.cgi?id=2051490 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 0

Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Microsoft Diagnostics Hub Standard Collector Runtime • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21871 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21871 •

CVSS: 8.8EPSS: 0%CPEs: 7EXPL: 0

ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en ASP.NET Core y Visual Studio • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43877 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

Visual Studio Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Visual Studio • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42319 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 0

Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Diagnostics Hub Standard Collector This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Microsoft Diagnostics Hub Standard Collector Service. By creating a symbolic link, an attacker can abuse the service to delete a directory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42277 https://www.zerodayinitiative.com/advisories/ZDI-21-1306 • CWE-269: Improper Privilege Management •