Логотип exploitDog
bind:CVE-2017-8579
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-8579

Количество 3

Количество 3

nvd логотип

CVE-2017-8579

почти 8 лет назад

The DirectX component in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to run arbitrary code in kernel mode via a specially crafted application, aka "DirectX Elevation of Privilege Vulnerability."

CVSS3: 7
EPSS: Низкий
msrc логотип

CVE-2017-8579

около 8 лет назад

DirectX Elevation of Privilege Vulnerability

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-m26g-pfvj-g9mg

около 3 лет назад

The DirectX component in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to run arbitrary code in kernel mode via a specially crafted application, aka "DirectX Elevation of Privilege Vulnerability."

CVSS3: 7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-8579

The DirectX component in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to run arbitrary code in kernel mode via a specially crafted application, aka "DirectX Elevation of Privilege Vulnerability."

CVSS3: 7
1%
Низкий
почти 8 лет назад
msrc логотип
CVE-2017-8579

DirectX Elevation of Privilege Vulnerability

CVSS3: 7
1%
Низкий
около 8 лет назад
github логотип
GHSA-m26g-pfvj-g9mg

The DirectX component in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an authenticated attacker to run arbitrary code in kernel mode via a specially crafted application, aka "DirectX Elevation of Privilege Vulnerability."

CVSS3: 7
1%
Низкий
около 3 лет назад

Уязвимостей на страницу