Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.818320
Categoría:Windows : Microsoft Bulletins
Título:Microsoft Windows Multiple Vulnerabilities (KB5003637)
Resumen:This host is missing a critical security; update according to Microsoft KB5003637
Descripción:Summary:
This host is missing a critical security
update according to Microsoft KB5003637

Vulnerability Insight:
Multiple flaws exist due to:

- An error in Server for NFS.

- An error in HTML Platform.

- An error in Scripting Engine.

For more information about the vulnerabilities refer to Reference links.

Vulnerability Impact:
Successful exploitation will allow an attacker
to perform remote code execution, gain access to potentially sensitive data,
conduct DoS, bypass security features and elevate privileges.

Affected Software/OS:
- Microsoft Windows 10 Version 2004 for 32-bit Systems

- Microsoft Windows 10 Version 2004 for x64-based Systems

Solution:
The vendor has released updates. Please see
the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2021-1675
VU#383432
https://www.kb.cert.org/vuls/id/383432
http://packetstormsecurity.com/files/163349/Microsoft-PrintNightmare-Proof-Of-Concept.html
http://packetstormsecurity.com/files/163351/PrintNightmare-Windows-Spooler-Service-Remote-Code-Execution.html
http://packetstormsecurity.com/files/167261/Print-Spooler-Remote-DLL-Injection.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675
Common Vulnerability Exposure (CVE) ID: CVE-2021-26414
http://packetstormsecurity.com/files/163206/Windows-Kerberos-AppContainer-Enterprise-Authentication-Capability-Bypass.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26414
Common Vulnerability Exposure (CVE) ID: CVE-2021-31199
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31199
Common Vulnerability Exposure (CVE) ID: CVE-2021-31201
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31201
Common Vulnerability Exposure (CVE) ID: CVE-2021-31951
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31951
Common Vulnerability Exposure (CVE) ID: CVE-2021-31952
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31952
Common Vulnerability Exposure (CVE) ID: CVE-2021-31954
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31954
https://www.zerodayinitiative.com/advisories/ZDI-21-668/
Common Vulnerability Exposure (CVE) ID: CVE-2021-31955
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31955
Common Vulnerability Exposure (CVE) ID: CVE-2021-31956
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31956
Common Vulnerability Exposure (CVE) ID: CVE-2021-31958
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31958
Common Vulnerability Exposure (CVE) ID: CVE-2021-31959
http://packetstormsecurity.com/files/163056/Internet-Explorer-jscript9.dll-Memory-Corruption.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31959
Common Vulnerability Exposure (CVE) ID: CVE-2021-31960
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31960
Common Vulnerability Exposure (CVE) ID: CVE-2021-31962
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31962
Common Vulnerability Exposure (CVE) ID: CVE-2021-31968
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31968
Common Vulnerability Exposure (CVE) ID: CVE-2021-31969
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31969
https://www.zerodayinitiative.com/advisories/ZDI-21-797/
Common Vulnerability Exposure (CVE) ID: CVE-2021-31970
http://packetstormsecurity.com/files/163256/Microsoft-Windows-Filtering-Platform-Token-Access-Check-Privilege-Escalation.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31970
Common Vulnerability Exposure (CVE) ID: CVE-2021-31971
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31971
Common Vulnerability Exposure (CVE) ID: CVE-2021-31972
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31972
Common Vulnerability Exposure (CVE) ID: CVE-2021-31973
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31973
Common Vulnerability Exposure (CVE) ID: CVE-2021-31974
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31974
Common Vulnerability Exposure (CVE) ID: CVE-2021-31975
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31975
Common Vulnerability Exposure (CVE) ID: CVE-2021-31976
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31976
Common Vulnerability Exposure (CVE) ID: CVE-2021-31977
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31977
Common Vulnerability Exposure (CVE) ID: CVE-2021-33739
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33739
Common Vulnerability Exposure (CVE) ID: CVE-2021-33742
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33742
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.