Логотип exploitDog
bind:CVE-2007-4315
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-4315

Количество 2

Количество 2

nvd логотип

CVE-2007-4315

больше 18 лет назад

The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".

CVSS2: 6.9
EPSS: Низкий
github логотип

GHSA-ch64-2w7r-7949

почти 4 года назад

The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2007-4315

The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".

CVSS2: 6.9
0%
Низкий
больше 18 лет назад
github логотип
GHSA-ch64-2w7r-7949

The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill".

0%
Низкий
почти 4 года назад

Уязвимостей на страницу