Логотип exploitDog
bind:CVE-2020-1012
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-1012

Количество 4

Количество 4

nvd логотип

CVE-2020-1012

больше 5 лет назад

<p>An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>There are multiple ways an attacker could exploit the vulnerability:</p> <ul> <li><p>In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email.</p> </li> <li><p>In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit this vulnerability, and then convince a

CVSS3: 8.8
EPSS: Средний
msrc логотип

CVE-2020-1012

больше 5 лет назад

WinINet API Elevation of Privilege Vulnerability

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-pqr6-x3hm-vw74

больше 3 лет назад

An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory, aka 'WinINet API Elevation of Privilege Vulnerability'.

CVSS3: 8.8
EPSS: Средний
fstec логотип

BDU:2020-04421

больше 5 лет назад

Уязвимость компонента WinINet API операционной системы Windows, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 8.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-1012

<p>An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>There are multiple ways an attacker could exploit the vulnerability:</p> <ul> <li><p>In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email.</p> </li> <li><p>In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit this vulnerability, and then convince a

CVSS3: 8.8
15%
Средний
больше 5 лет назад
msrc логотип
CVE-2020-1012

WinINet API Elevation of Privilege Vulnerability

CVSS3: 8.8
15%
Средний
больше 5 лет назад
github логотип
GHSA-pqr6-x3hm-vw74

An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory, aka 'WinINet API Elevation of Privilege Vulnerability'.

CVSS3: 8.8
15%
Средний
больше 3 лет назад
fstec логотип
BDU:2020-04421

Уязвимость компонента WinINet API операционной системы Windows, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 8.8
15%
Средний
больше 5 лет назад

Уязвимостей на страницу