A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.To exploit the vulnerabi...
5.8CVSS
5.8AI Score
0.001EPSS
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.To exploit the vulnerabi...
5.8CVSS
5.8AI Score
0.001EPSS
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.To exploit this vulnerability, an attacker would have to log on to an affected system and run a special...
5.8CVSS
5.1AI Score
0.001EPSS
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.To exploit the vulnerabi...
5.8CVSS
5.8AI Score
0.001EPSS
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash.To exploit the vulnerabi...
5.8CVSS
5.8AI Score
0.001EPSS
An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.An authenticated attacker could exploit this vulnerabil...
5.5CVSS
4.8AI Score
0.001EPSS
An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries.To exploit this vulnerability, an attacker would have to log on to an a...
5.6CVSS
6.4AI Score
0.001EPSS
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.There are multiple ways an attacker could exploit th...
5.5CVSS
4.9AI Score
0.001EPSS
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker wou...
5.5CVSS
4.8AI Score
0.0004EPSS
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker wou...
5.5CVSS
4.8AI Score
0.0004EPSS
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.There are multiple ways an attacker could exploit th...
5.5CVSS
4.9AI Score
0.001EPSS
A security feature bypass exists when Windows incorrectly validates CAB file signatures. An attacker who successfully exploited this vulnerability could inject code into a CAB file without invalidating the file's signature.To exploit the vulnerability, an attacker could modify a signed CAB file and...
5.5CVSS
5.5AI Score
0.001EPSS
A denial of service vulnerability exists when the XmlLite runtime (XmlLite.dll) improperly parses XML input. An attacker who successfully exploited this vulnerability could cause a denial of service against an XML application.A remote unauthenticated attacker could exploit this vulnerability by iss...
5.5CVSS
7.2AI Score
0.001EPSS
<p>An elevation of privilege vulnerability exists when Active Directory Federation Services (ADFS) improperly handles multi-factor authentication requests. An attacker who successfully exploited this vulnerability could bypass some, but not all, of the authentication factors.</p><p>To exploit this ...
5CVSS
6.6AI Score
0.001EPSS
<p>An information disclosure vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system (low-integrity to medium-integrity).</p><p>This vulnerability by itself does not al...
5.5CVSS
7.3AI Score
0.007EPSS
<p>An information disclosure vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p><p>An attacker could exploit this vulnerab...
5.5CVSS
6.2AI Score
0.001EPSS
5.5CVSS
6.5AI Score
0.0004EPSS
<p>An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.</p><p>To exploit the vulnerability, an attacker would have t...
5.5CVSS
6.3AI Score
0.0004EPSS
<p>A denial of service vulnerability exists when Windows Routing Utilities improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.</p><p>To exploit this vulnerability, an attacker would have to log on to an affec...
5.5CVSS
6.7AI Score
0.0004EPSS
<p>An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.</p><p>To exploit this vulnerability, an at...
5.5CVSS
6.2AI Score
0.0004EPSS
<p>An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.</p><p>An attacker could exploit this vulnerability by running a spe...
5.5CVSS
6.5AI Score
0.0004EPSS
<p>An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system.</p><p>To exploit the vulnerability, an attacker would have to log on to an affected sy...
5.8CVSS
6.7AI Score
0.0004EPSS
<p>An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.</p><p>To exploit this vulnerability, an attacker would have ...
5.5CVSS
6.1AI Score
0.0004EPSS
<p>An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.</p><p>There are multiple ways an attacker coul...
5.5CVSS
6.3AI Score
0.005EPSS
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.There are multiple ways an attacke...
5.5CVSS
6.8AI Score
0.001EPSS
An information disclosure vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s systemTo exploit this vulnerability, an attacker would need to run a special...
5.5CVSS
5.6AI Score
0.0004EPSS
An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.To exploit the vulnerability, an aut...
5.5CVSS
5.5AI Score
0.0004EPSS
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker would have to log on ...
5.5CVSS
5.4AI Score
0.003EPSS
<p>A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise a users's encrypted transmission channel.</p><p>To exploit the vulnerability, an attacker would hav...
5.4CVSS
6.1AI Score
0.001EPSS
<p>An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p><p>To exploit this vulnerability, an attacker would have to ...
5.5CVSS
5.6AI Score
0.0004EPSS
<p>An information disclosure vulnerability exists when the Windows KernelStream improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p><p>To exploit this vulnerability, an attacker would ha...
5.5CVSS
6.5AI Score
0.0004EPSS
<p>An information disclosure vulnerability exists when NetBIOS over TCP (NBT) Extensions (NetBT) improperly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p><p>To exploit this vulnerability, an a...
5.5CVSS
6.5AI Score
0.0004EPSS
<p>An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface Plus (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however,...
5.5CVSS
6.7AI Score
0.0004EPSS
<p>An information disclosure vulnerability exists when the Windows Enterprise App Management Service improperly handles certain file operations. An attacker who successfully exploited this vulnerability could read arbitrary files.</p><p>An attacker with unprivileged access to a vulnerable system co...
5.5CVSS
6.3AI Score
0.0004EPSS
<p>A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files.</p><p>In an attack scenario, an attacker could bypass security features intended to preve...
5.3CVSS
6.5AI Score
0.001EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
6.9AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
7AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
6.1AI Score
0.0004EPSS
5.5CVSS
6.8AI Score
0.0004EPSS
5.5CVSS
6.3AI Score
0.0004EPSS
5.5CVSS
6.4AI Score
0.0004EPSS