Количество 4
Количество 4

CVE-2019-1190
An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory.

CVE-2019-1190
Windows Image Elevation of Privilege Vulnerability
GHSA-rq2v-5grq-h5mc
An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory.An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory., aka 'Windows Image Elevation of Privilege Vulnerability'.

BDU:2019-03013
Уязвимость ядра операционной системы Windows, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2019-1190 An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory. | CVSS3: 7.8 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-1190 Windows Image Elevation of Privilege Vulnerability | CVSS3: 7.8 | 0% Низкий | почти 6 лет назад |
GHSA-rq2v-5grq-h5mc An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory.An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory., aka 'Windows Image Elevation of Privilege Vulnerability'. | 0% Низкий | около 3 лет назад | ||
![]() | BDU:2019-03013 Уязвимость ядра операционной системы Windows, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | почти 6 лет назад |
Уязвимостей на страницу