Логотип exploitDog
bind:CVE-2020-1506
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-1506

Количество 4

Количество 4

nvd логотип

CVE-2020-1506

больше 5 лет назад

<p>An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>There are multiple ways an attacker could exploit the vulnerability:</p> <ul> <li><p>In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email.</p> </li> <li><p>In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit this vulnerability, and then convince a

CVSS3: 6.1
EPSS: Низкий
msrc логотип

CVE-2020-1506

больше 5 лет назад

Windows Start-Up Application Elevation of Privilege Vulnerability

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-f387-26c4-6jhr

больше 3 лет назад

An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory, aka 'Windows Start-Up Application Elevation of Privilege Vulnerability'.

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2020-04420

больше 5 лет назад

Уязвимость компонента WinINet API операционной системы Windows, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-1506

<p>An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>There are multiple ways an attacker could exploit the vulnerability:</p> <ul> <li><p>In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email.</p> </li> <li><p>In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit this vulnerability, and then convince a

CVSS3: 6.1
3%
Низкий
больше 5 лет назад
msrc логотип
CVE-2020-1506

Windows Start-Up Application Elevation of Privilege Vulnerability

CVSS3: 4.4
3%
Низкий
больше 5 лет назад
github логотип
GHSA-f387-26c4-6jhr

An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory, aka 'Windows Start-Up Application Elevation of Privilege Vulnerability'.

CVSS3: 6.1
3%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-04420

Уязвимость компонента WinINet API операционной системы Windows, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 8.8
3%
Низкий
больше 5 лет назад

Уязвимостей на страницу