Логотип exploitDog
bind:CVE-2004-0893
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2004-0893

Количество 2

Количество 2

nvd логотип

CVE-2004-0893

около 21 года назад

The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."

CVSS2: 7.2
EPSS: Низкий
github логотип

GHSA-rm55-79mv-22rp

почти 4 года назад

The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2004-0893

The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."

CVSS2: 7.2
1%
Низкий
около 21 года назад
github логотип
GHSA-rm55-79mv-22rp

The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."

1%
Низкий
почти 4 года назад

Уязвимостей на страницу