Логотип exploitDog
bind:CVE-2020-16907
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-16907

Количество 4

Количество 4

nvd логотип

CVE-2020-16907

почти 5 лет назад

<p>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.</p> <p>The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.</p>

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2020-16907

почти 5 лет назад

Win32k Elevation of Privilege Vulnerability

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-3c69-6w5j-4xrh

около 3 лет назад

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16913.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2020-04763

почти 5 лет назад

Уязвимость компонента win32k операционной системы Windows, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-16907

<p>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.</p> <p>The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.</p>

CVSS3: 7.8
1%
Низкий
почти 5 лет назад
msrc логотип
CVE-2020-16907

Win32k Elevation of Privilege Vulnerability

CVSS3: 7.8
1%
Низкий
почти 5 лет назад
github логотип
GHSA-3c69-6w5j-4xrh

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16913.

CVSS3: 7.8
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-04763

Уязвимость компонента win32k операционной системы Windows, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
1%
Низкий
почти 5 лет назад

Уязвимостей на страницу