Описание
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.
Ссылки
- Issue TrackingVendor Advisory
- Mailing ListThird Party Advisory
- Issue TrackingVendor Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
EPSS
8 High
CVSS3
5.2 Medium
CVSS2
Дефекты
Связанные уязвимости
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.
Use after free vulnerability in EDK II may allow an authenticated user ...
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.
EPSS
8 High
CVSS3
5.2 Medium
CVSS2