Логотип exploitDog
bind:CVE-2016-7271
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-7271

Количество 3

Количество 3

nvd логотип

CVE-2016-7271

почти 9 лет назад

The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2016-7271

почти 9 лет назад

Windows Elevation of Privilege Vulnerability

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-cgfg-gp9v-cc74

больше 3 лет назад

The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-7271

The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."

CVSS3: 7.8
0%
Низкий
почти 9 лет назад
msrc логотип
CVE-2016-7271

Windows Elevation of Privilege Vulnerability

CVSS3: 6.3
0%
Низкий
почти 9 лет назад
github логотип
GHSA-cgfg-gp9v-cc74

The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу