1432 matches found
CVE-2021-28332
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2021-28334
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2021-28342
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2021-28479
Windows CSC Service Information Disclosure Vulnerability
CVE-2021-33752
Windows DNS Snap-in Remote Code Execution Vulnerability
CVE-2021-41333
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-21880
Windows GDI+ Information Disclosure Vulnerability
CVE-2022-21881
Windows Kernel Elevation of Privilege Vulnerability
CVE-2020-0626
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0613, CVE-2020-0614, CVE-2020-0623, CVE-2020-0625, CVE-2020-0627, CVE-2020-0628...
CVE-2020-0632
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0613, CVE-2020-0614, CVE-2020-0623, CVE-2020-0625, CVE-2020-0626, CVE-2020-0627...
CVE-2020-1512
An information disclosure vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.An attacker could exploit this vulnerability by r...
CVE-2020-1566
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new ...
CVE-2020-16936
An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.The ...
CVE-2021-28338
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2021-28344
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2021-33785
Windows AF_UNIX Socket Provider Denial of Service Vulnerability
CVE-2021-34516
Win32k Elevation of Privilege Vulnerability
CVE-2021-36957
Windows Desktop Bridge Elevation of Privilege Vulnerability
CVE-2021-41367
NTFS Elevation of Privilege Vulnerability
CVE-2022-26798
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-29131
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVE-2019-1453
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability'.
CVE-2019-1467
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1465, CVE-2019-1466.
CVE-2020-1031
An information disclosure vulnerability exists in the way that the Windows Server DHCP service improperly discloses the contents of its memory.To exploit the vulnerability, an unauthenticated attacker could send a specially crafted packet to an affected DHCP server. An attacker who successfully exp...
CVE-2020-1083
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker wou...
CVE-2020-1112
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) IIS module improperly handles uploaded content, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
CVE-2020-1133
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.An attacker could exploit this vulnerability by running a specially cra...
CVE-2020-1355
A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory.An attacker who successfully exploited the vulnerability would gain execution on a victim system.The security update addresses the vulnerability by correcting how the Windows Font Driver Host ha...
CVE-2020-1510
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker would have to log on ...
CVE-2020-16897
An information disclosure vulnerability exists when NetBIOS over TCP (NBT) Extensions (NetBT) improperly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker wo...
CVE-2021-28327
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2021-28336
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2021-28352
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2021-31976
Server for NFS Information Disclosure Vulnerability
CVE-2021-34496
Windows GDI Information Disclosure Vulnerability
CVE-2021-34512
Storage Spaces Controller Elevation of Privilege Vulnerability
CVE-2021-40462
Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability
CVE-2020-1286
A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths.An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user, aka 'Windows Shell Remote Code Execution Vulnerability'.
CVE-2020-1377
An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system.A locally authenticated attacker could exploit this vulnerability by...
CVE-2020-1531
An elevation of privilege vulnerability exists when the Windows Accounts Control improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.The securit...
CVE-2020-1562
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.To exploit the vulnerability, a user would have to open a specially crafted f...
CVE-2021-1645
Windows Docker Information Disclosure Vulnerability
CVE-2021-1657
Windows Fax Compose Form Remote Code Execution Vulnerability
CVE-2021-28346
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2021-33784
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2021-40460
Windows Remote Procedure Call Runtime Security Feature Bypass Vulnerability
CVE-2021-41332
Windows Print Spooler Information Disclosure Vulnerability
CVE-2021-42275
Microsoft COM for Windows Remote Code Execution Vulnerability
CVE-2022-21960
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVE-2020-1339
A remote code execution vulnerability exists when Windows Media Audio Codec improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system.There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user...