Page 78 of 1982 results (0.015 seconds)

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

Windows CSC Service Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios del Windows CSC Service. Este ID de CVE es diferente de CVE-2021-1652, CVE-2021-1653, CVE-2021-1654, CVE-2021-1655, CVE-2021-1659, CVE-2021-1688 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1693 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1693 • CWE-269: Improper Privilege Management •

CVSS: 7.7EPSS: 0%CPEs: 6EXPL: 0

Windows Hyper-V Denial of Service Vulnerability Una Vulnerabilidad de Denegación de Servicio de Hyper-V. Este ID de CVE es diferente de CVE-2021-1692 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1691 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1691 •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

Windows CSC Service Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios del Windows CSC Service. Este ID de CVE es diferente de CVE-2021-1652, CVE-2021-1653, CVE-2021-1654, CVE-2021-1655, CVE-2021-1659, CVE-2021-1693 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1688 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1688 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

Windows Multipoint Management Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows Multipoint Management • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1689 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1689 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

Windows AppX Deployment Extensions Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows AppX Deployment Extensions. Este ID de CVE es diferente de CVE-2021-1642 This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AppX Deployment Service. By creating a directory junction, an attacker can abuse the service to create files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1685 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1685 • CWE-269: Improper Privilege Management •