10 results (0.010 seconds)

CVSS: 7.8EPSS: 1%CPEs: 96EXPL: 0

14 Feb 2023 — .NET and Visual Studio Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21808 • CWE-416: Use After Free •

CVSS: 5.0EPSS: 0%CPEs: 71EXPL: 0

14 Feb 2023 — .NET Framework Denial of Service Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21722 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.5EPSS: 94%CPEs: 9EXPL: 5

10 Nov 2021 — Active Directory Domain Services Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Active Directory Domain Services. Este ID de CVE es diferente de CVE-2021-42282, CVE-2021-42287, CVE-2021-42291 Microsoft Active Directory Domain Services contains an unspecified vulnerability that allows for privilege escalation. • https://github.com/safebuffer/sam-the-admin •

CVSS: 9.0EPSS: 4%CPEs: 20EXPL: 0

10 Nov 2021 — Windows Installer Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios del instalador de Windows This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windows Installer service. By creating a junction, an attacker can abuse the service to delete a file... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41379 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 13%CPEs: 7EXPL: 0

13 Oct 2021 — Win32k Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Win32k. Este ID de CVE es único de CVE-2021-40449, CVE-2021-40450 Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41357 •

CVSS: 7.8EPSS: 15%CPEs: 10EXPL: 0

13 Oct 2021 — Win32k Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Win32k . Este ID de CVE es diferente de CVE-2021-40449, CVE-2021-41357 Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40450 •

CVSS: 8.8EPSS: 82%CPEs: 21EXPL: 10

13 Oct 2021 — Win32k Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Win32k . Este ID de CVE es diferente de CVE-2021-40450, CVE-2021-41357 Unspecified vulnerability allows for an authenticated user to escalate privileges. • https://packetstorm.news/files/id/164926 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 5%CPEs: 18EXPL: 0

11 Aug 2021 — Windows User Profile Service Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Windows User Profile Service This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the User Profile Service. By creating a directory junction, an attacker can abuse the se... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34484 •

CVSS: 9.9EPSS: 93%CPEs: 4EXPL: 14

11 May 2021 — HTTP Protocol Stack Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de HTTP Protocol Stack Microsoft HTTP Protocol Stack contains a vulnerability in http.sys that allows for remote code execution. • https://packetstorm.news/files/id/180583 • CWE-416: Use After Free •

CVSS: 10.0EPSS: 94%CPEs: 25EXPL: 69

17 Aug 2020 — An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the... • https://packetstorm.news/files/id/180777 • CWE-287: Improper Authentication CWE-330: Use of Insufficiently Random Values •