Логотип exploitDog
bind:CVE-2016-7271
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-7271

Количество 3

Количество 3

nvd логотип

CVE-2016-7271

больше 8 лет назад

The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2016-7271

больше 8 лет назад

Windows Elevation of Privilege Vulnerability

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-cgfg-gp9v-cc74

около 3 лет назад

The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-7271

The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."

CVSS3: 7.8
0%
Низкий
больше 8 лет назад
msrc логотип
CVE-2016-7271

Windows Elevation of Privilege Vulnerability

CVSS3: 6.3
0%
Низкий
больше 8 лет назад
github логотип
GHSA-cgfg-gp9v-cc74

The Secure Kernel Mode implementation in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to bypass the virtual trust level (VTL) protection mechanism via a crafted application, aka "Secure Kernel Mode Elevation of Privilege Vulnerability."

CVSS3: 7.8
0%
Низкий
около 3 лет назад

Уязвимостей на страницу