Логотип exploitDog
bind:CVE-2020-16913
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-16913

Количество 5

Количество 5

nvd логотип

CVE-2020-16913

почти 5 лет назад

<p>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.</p> <p>The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.</p>

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2020-16913

почти 5 лет назад

Win32k Elevation of Privilege Vulnerability

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-97h7-f4f7-86x2

около 3 лет назад

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16907.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2020-05457

почти 5 лет назад

Уязвимость компонента win32k операционной системы Windows, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2020-04807

почти 5 лет назад

Уязвимость компонента win32k операционной системы Windows, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-16913

<p>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.</p> <p>The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.</p>

CVSS3: 7.8
1%
Низкий
почти 5 лет назад
msrc логотип
CVE-2020-16913

Win32k Elevation of Privilege Vulnerability

CVSS3: 7.8
1%
Низкий
почти 5 лет назад
github логотип
GHSA-97h7-f4f7-86x2

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16907.

CVSS3: 7.8
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-05457

Уязвимость компонента win32k операционной системы Windows, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
1%
Низкий
почти 5 лет назад
fstec логотип
BDU:2020-04807

Уязвимость компонента win32k операционной системы Windows, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
1%
Низкий
почти 5 лет назад

Уязвимостей на страницу