972 matches found
CVE-2021-1708
Windows GDI+ Information Disclosure Vulnerability
CVE-2021-26864
Windows Virtual Registry Provider Elevation of Privilege Vulnerability
CVE-2021-28312
Windows NTFS Denial of Service Vulnerability
CVE-2021-28326
Windows AppX Deployment Server Denial of Service Vulnerability
CVE-2021-28439
Windows TCP/IP Driver Denial of Service Vulnerability
CVE-2021-28441
Windows Hyper-V Information Disclosure Vulnerability
CVE-2021-43230
Windows NTFS Elevation of Privilege Vulnerability
CVE-2022-26795
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2020-16905
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it.An attacker who successfully exploited the vulnerability could gain greater access to ...
CVE-2020-17004
Windows Graphics Component Information Disclosure Vulnerability
CVE-2020-17033
Windows Remote Access Elevation of Privilege Vulnerability
CVE-2020-17041
Windows Print Configuration Elevation of Privilege Vulnerability
CVE-2020-17068
Windows GDI+ Remote Code Execution Vulnerability
CVE-2020-17162
Microsoft Windows Security Feature Bypass Vulnerability
CVE-2021-28319
Windows TCP/IP Driver Denial of Service Vulnerability
CVE-2021-28351
Windows Speech Runtime Elevation of Privilege Vulnerability
CVE-2021-43233
Remote Desktop Client Remote Code Execution Vulnerability
CVE-2021-43240
NTFS Set Short Name Elevation of Privilege Vulnerability
CVE-2020-0904
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtua...
CVE-2020-0922
A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.To exploit the vulnerability, a user would have to open a specially crafted file...
CVE-2020-1053
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with ful...
CVE-2020-1146
An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.The security...
CVE-2020-1159
An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles file creation in protected locations. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker cou...
CVE-2020-17045
Windows KernelStream Information Disclosure Vulnerability
CVE-2021-1687
Windows WalletService Elevation of Privilege Vulnerability
CVE-2021-1693
Windows CSC Service Elevation of Privilege Vulnerability
CVE-2021-28328
Windows DNS Information Disclosure Vulnerability
CVE-2021-28438
Windows Console Driver Denial of Service Vulnerability
CVE-2021-34509
Storage Spaces Controller Information Disclosure Vulnerability
CVE-2021-43248
Windows Digital Media Receiver Elevation of Privilege Vulnerability
CVE-2022-29114
Windows Print Spooler Information Disclosure Vulnerability
CVE-2020-0912
An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privil...
CVE-2020-1047
An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system.This vulnerability by itself does not allow arbit...
CVE-2020-17027
Windows Remote Access Elevation of Privilege Vulnerability
CVE-2020-17046
Windows Error Reporting Denial of Service Vulnerability
CVE-2020-17094
Windows Error Reporting Information Disclosure Vulnerability
CVE-2021-1679
Windows CryptoAPI Denial of Service Vulnerability
CVE-2021-1685
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
CVE-2021-1686
Windows WalletService Elevation of Privilege Vulnerability
CVE-2021-24082
Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability
CVE-2021-24090
Windows Error Reporting Elevation of Privilege Vulnerability
CVE-2021-26416
Windows Hyper-V Denial of Service Vulnerability
CVE-2021-26863
Windows Win32k Elevation of Privilege Vulnerability
CVE-2021-26881
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
CVE-2021-26901
Windows Event Tracing Elevation of Privilege Vulnerability
CVE-2021-27079
Windows Media Photo Codec Information Disclosure Vulnerability
CVE-2021-28309
Windows Kernel Information Disclosure Vulnerability
CVE-2020-1038
A denial of service vulnerability exists when Windows Routing Utilities improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.To exploit this vulnerability, an attacker would have to log on to an affected system...
CVE-2020-1074
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.An attacker could exploit this vulnerability by enticing a victim to open...
CVE-2020-1245
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; o...