Page 86 of 976 results (0.011 seconds)

CVSS: 5.5EPSS: 0%CPEs: 19EXPL: 1

Windows (modem.sys) Information Disclosure Vulnerability Una Vulnerabilidad de Divulgación de Información de Windows (modem.sys) • https://github.com/waleedassar/CVE-2021-1699 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1699 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1699 •

CVSS: 5.5EPSS: 0%CPEs: 19EXPL: 0

Windows Graphics Component Information Disclosure Vulnerability Una Vulnerabilidad de Divulgación de Información de Windows Graphics Component • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1696 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1696 •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

Windows InstallService Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows InstallService This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Microsoft Store Install Service. By creating a directory junction, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1697 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1697 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 0

Windows Print Spooler Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Windows Print Spooler This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Print Spooler service. By creating a directory junction, an attacker can abuse the Print Spooler service to create a file in an arbitrary location. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1695 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1695 • CWE-269: Improper Privilege Management •

CVSS: 9.8EPSS: 0%CPEs: 19EXPL: 0

Windows Update Stack Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios de Windows Update Stack • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1694 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1694 • CWE-269: Improper Privilege Management •