Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.818319
Kategorie:Windows : Microsoft Bulletins
Titel:Microsoft Windows Multiple Vulnerabilities (KB5003635)
Zusammenfassung:This host is missing a critical security; update according to Microsoft KB5003635
Beschreibung:Summary:
This host is missing a critical security
update according to Microsoft KB5003635

Vulnerability Insight:
Multiple flaws exist due to:

- An error in Server for NFS.

- An error in HTML Platform.

- An error in Scripting Engine.

For more information about the vulnerabilities refer to Reference links.

Vulnerability Impact:
Successful exploitation will allow an attacker
to perform remote code execution, gain access to potentially sensitive data,
conduct DoS, bypass security features and elevate privileges.

Affected Software/OS:
- Microsoft Windows 10 Version 1909 for 32-bit Systems

- Microsoft Windows 10 Version 1909 for x64-based Systems

Solution:
The vendor has released updates. Please see
the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2021-1675
VU#383432
https://www.kb.cert.org/vuls/id/383432
http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html
http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html
http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675
Common Vulnerability Exposure (CVE) ID: CVE-2021-26414
http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26414
Common Vulnerability Exposure (CVE) ID: CVE-2021-31199
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31199
Common Vulnerability Exposure (CVE) ID: CVE-2021-31201
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31201
Common Vulnerability Exposure (CVE) ID: CVE-2021-31951
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31951
Common Vulnerability Exposure (CVE) ID: CVE-2021-31952
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31952
Common Vulnerability Exposure (CVE) ID: CVE-2021-31954
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31954
https://www.zerodayinitiative.com/advisories/ZDI-21-668/
Common Vulnerability Exposure (CVE) ID: CVE-2021-31955
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31955
Common Vulnerability Exposure (CVE) ID: CVE-2021-31956
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31956
Common Vulnerability Exposure (CVE) ID: CVE-2021-31958
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31958
Common Vulnerability Exposure (CVE) ID: CVE-2021-31959
http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31959
Common Vulnerability Exposure (CVE) ID: CVE-2021-31962
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31962
Common Vulnerability Exposure (CVE) ID: CVE-2021-31968
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31968
Common Vulnerability Exposure (CVE) ID: CVE-2021-31969
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31969
https://www.zerodayinitiative.com/advisories/ZDI-21-797/
Common Vulnerability Exposure (CVE) ID: CVE-2021-31970
http://packetstormsecurity.com/files/163256/Microsoft-Windows-Filtering-Platform-Token-Access-Check-Privilege-Escalation.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31970
Common Vulnerability Exposure (CVE) ID: CVE-2021-31971
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31971
Common Vulnerability Exposure (CVE) ID: CVE-2021-31972
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31972
Common Vulnerability Exposure (CVE) ID: CVE-2021-31973
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31973
Common Vulnerability Exposure (CVE) ID: CVE-2021-31974
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31974
Common Vulnerability Exposure (CVE) ID: CVE-2021-31975
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31975
Common Vulnerability Exposure (CVE) ID: CVE-2021-31976
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31976
Common Vulnerability Exposure (CVE) ID: CVE-2021-31977
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31977
Common Vulnerability Exposure (CVE) ID: CVE-2021-33739
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33739
Common Vulnerability Exposure (CVE) ID: CVE-2021-33742
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33742
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.