Количество 4
Количество 4

CVE-2020-0981
A security feature bypass vulnerability exists when Windows fails to properly handle token relationships.An attacker who successfully exploited the vulnerability could allow an application with a certain integrity level to execute code at a different integrity level, leading to a sandbox escape.The update addresses the vulnerability by correcting how Windows handles token relationships, aka 'Windows Token Security Feature Bypass Vulnerability'.

CVE-2020-0981
Windows Token Security Feature Bypass Vulnerability
GHSA-93vj-6w32-x9gc
A security feature bypass vulnerability exists when Windows fails to properly handle token relationships.An attacker who successfully exploited the vulnerability could allow an application with a certain integrity level to execute code at a different integrity level, leading to a sandbox escape.The update addresses the vulnerability by correcting how Windows handles token relationships, aka 'Windows Token Security Feature Bypass Vulnerability'.

BDU:2020-02210
Уязвимость компонента NtFilterToken ParentTokenId операционных систем Microsoft Windows, позволяющая нарушителю повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2020-0981 A security feature bypass vulnerability exists when Windows fails to properly handle token relationships.An attacker who successfully exploited the vulnerability could allow an application with a certain integrity level to execute code at a different integrity level, leading to a sandbox escape.The update addresses the vulnerability by correcting how Windows handles token relationships, aka 'Windows Token Security Feature Bypass Vulnerability'. | CVSS3: 8.8 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2020-0981 Windows Token Security Feature Bypass Vulnerability | CVSS3: 6.3 | 0% Низкий | больше 5 лет назад |
GHSA-93vj-6w32-x9gc A security feature bypass vulnerability exists when Windows fails to properly handle token relationships.An attacker who successfully exploited the vulnerability could allow an application with a certain integrity level to execute code at a different integrity level, leading to a sandbox escape.The update addresses the vulnerability by correcting how Windows handles token relationships, aka 'Windows Token Security Feature Bypass Vulnerability'. | 0% Низкий | около 3 лет назад | ||
![]() | BDU:2020-02210 Уязвимость компонента NtFilterToken ParentTokenId операционных систем Microsoft Windows, позволяющая нарушителю повысить свои привилегии | CVSS3: 8.8 | 0% Низкий | больше 5 лет назад |
Уязвимостей на страницу