Количество 4
Количество 4

CVE-2020-16892
<p>An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory.</p>

CVE-2020-16892
Windows Image Elevation of Privilege Vulnerability
GHSA-6xmg-694r-qxfg
An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory.An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory., aka 'Windows Image Elevation of Privilege Vulnerability'.

BDU:2020-04707
Уязвимость ядра операционной системы Windows, позволяющая нарушителю повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2020-16892 <p>An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory.</p> | CVSS3: 7.8 | 1% Низкий | почти 5 лет назад |
![]() | CVE-2020-16892 Windows Image Elevation of Privilege Vulnerability | CVSS3: 7.8 | 1% Низкий | почти 5 лет назад |
GHSA-6xmg-694r-qxfg An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory.An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory., aka 'Windows Image Elevation of Privilege Vulnerability'. | CVSS3: 7.8 | 1% Низкий | около 3 лет назад | |
![]() | BDU:2020-04707 Уязвимость ядра операционной системы Windows, позволяющая нарушителю повысить свои привилегии | CVSS3: 7.8 | 1% Низкий | почти 5 лет назад |
Уязвимостей на страницу