Количество 3
Количество 3

CVE-2016-7271
The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."

CVE-2016-7271
Windows Elevation of Privilege Vulnerability
GHSA-cgfg-gp9v-cc74
The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2016-7271 The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability." | CVSS3: 7.8 | 0% Низкий | больше 8 лет назад |
![]() | CVE-2016-7271 Windows Elevation of Privilege Vulnerability | CVSS3: 6.3 | 0% Низкий | больше 8 лет назад |
GHSA-cgfg-gp9v-cc74 The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability." | CVSS3: 7.8 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу