Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.815737
Categoría:Windows : Microsoft Bulletins
Título:Microsoft Windows Multiple Vulnerabilities (KB4530734)
Resumen:This host is missing a critical security; update according to Microsoft KB4530734
Descripción:Summary:
This host is missing a critical security
update according to Microsoft KB4530734

Vulnerability Insight:
Multiple flaws exist due to:

- Win32k component fails to properly handle objects in memory.

- win32k component improperly provides kernel information.

- Windows kernel improperly handles objects in memory.

- Windows improperly handles COM object creation.

Please see the references for more information about the vulnerabilities.

Vulnerability Impact:
Successful exploitation will allow an attacker to
execute arbitrary code, elevate privileges, gain access to sensitive information,
cause denial of service and bypass security restrictions.

Affected Software/OS:
- Microsoft Windows 7 for 32-bit/x64 Systems Service Pack 1

- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1

Solution:
The vendor has released updates. Please see
the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2019-1453
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1453
Common Vulnerability Exposure (CVE) ID: CVE-2019-1458
http://packetstormsecurity.com/files/156651/Microsoft-Windows-WizardOpium-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/159569/Microsoft-Windows-Uninitialized-Variable-Local-Privilege-Escalation.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1458
Common Vulnerability Exposure (CVE) ID: CVE-2019-1465
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1465
https://www.zerodayinitiative.com/advisories/ZDI-19-1008/
Common Vulnerability Exposure (CVE) ID: CVE-2019-1466
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1466
https://www.zerodayinitiative.com/advisories/ZDI-19-1007/
Common Vulnerability Exposure (CVE) ID: CVE-2019-1467
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1467
Common Vulnerability Exposure (CVE) ID: CVE-2019-1468
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1468
https://www.zerodayinitiative.com/advisories/ZDI-19-1004/
Common Vulnerability Exposure (CVE) ID: CVE-2019-1469
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1469
Common Vulnerability Exposure (CVE) ID: CVE-2019-1470
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1470
Common Vulnerability Exposure (CVE) ID: CVE-2019-1474
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1474
Common Vulnerability Exposure (CVE) ID: CVE-2019-1478
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1478
Common Vulnerability Exposure (CVE) ID: CVE-2019-1480
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1480
https://www.zerodayinitiative.com/advisories/ZDI-19-1002/
Common Vulnerability Exposure (CVE) ID: CVE-2019-1481
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1481
https://www.zerodayinitiative.com/advisories/ZDI-19-1003/
Common Vulnerability Exposure (CVE) ID: CVE-2019-1484
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1484
Common Vulnerability Exposure (CVE) ID: CVE-2019-1485
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1485
Common Vulnerability Exposure (CVE) ID: CVE-2019-1488
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1488
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.