487 matches found
CVE-2020-17041
Windows Print Configuration Elevation of Privilege Vulnerability
CVE-2020-17068
Windows GDI+ Remote Code Execution Vulnerability
CVE-2020-17162
Microsoft Windows Security Feature Bypass Vulnerability
CVE-2021-28319
Windows TCP/IP Driver Denial of Service Vulnerability
CVE-2021-28351
Windows Speech Runtime Elevation of Privilege Vulnerability
CVE-2020-0904
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtua...
CVE-2020-0922
A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.To exploit the vulnerability, a user would have to open a specially crafted file...
CVE-2020-1053
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with ful...
CVE-2020-1146
An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.The security...
CVE-2020-1159
An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles file creation in protected locations. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker cou...
CVE-2020-17045
Windows KernelStream Information Disclosure Vulnerability
CVE-2021-1693
Windows CSC Service Elevation of Privilege Vulnerability
CVE-2021-28328
Windows DNS Information Disclosure Vulnerability
CVE-2021-28438
Windows Console Driver Denial of Service Vulnerability
CVE-2020-0912
An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privil...
CVE-2020-1047
An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system.This vulnerability by itself does not allow arbit...
CVE-2020-17027
Windows Remote Access Elevation of Privilege Vulnerability
CVE-2020-17046
Windows Error Reporting Denial of Service Vulnerability
CVE-2020-17094
Windows Error Reporting Information Disclosure Vulnerability
CVE-2021-1679
Windows CryptoAPI Denial of Service Vulnerability
CVE-2021-1685
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
CVE-2021-24082
Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability
CVE-2021-24090
Windows Error Reporting Elevation of Privilege Vulnerability
CVE-2021-26416
Windows Hyper-V Denial of Service Vulnerability
CVE-2021-26863
Windows Win32k Elevation of Privilege Vulnerability
CVE-2021-26881
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
CVE-2021-26901
Windows Event Tracing Elevation of Privilege Vulnerability
CVE-2021-27079
Windows Media Photo Codec Information Disclosure Vulnerability
CVE-2021-28309
Windows Kernel Information Disclosure Vulnerability
CVE-2020-0856
An information disclosure vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited this vulnerability would be able to read sensitive information about the target system.To exploit this condition, an authen...
CVE-2020-1038
A denial of service vulnerability exists when Windows Routing Utilities improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.To exploit this vulnerability, an attacker would have to log on to an affected system...
CVE-2020-1074
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.An attacker could exploit this vulnerability by enticing a victim to open...
CVE-2020-1245
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; o...
CVE-2020-16900
An elevation of privilege vulnerability exists when the Windows Event System improperly handles objects in memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.The ...
CVE-2020-16915
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.There are multiple ways an attacke...
CVE-2020-17029
Windows Canonical Display Driver Information Disclosure Vulnerability
CVE-2021-1642
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
CVE-2021-26413
Windows Installer Spoofing Vulnerability
CVE-2021-26875
Windows Win32k Elevation of Privilege Vulnerability
CVE-2021-26876
OpenType Font Parsing Remote Code Execution Vulnerability
CVE-2021-27077
Windows Win32k Elevation of Privilege Vulnerability
CVE-2021-28314
Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2021-28347
Windows Speech Runtime Elevation of Privilege Vulnerability
CVE-2021-28446
Windows Portmapping Information Disclosure Vulnerability
CVE-2020-0664
An information disclosure vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited this vulnerability would be able to read sensitive information about the target system.To exploit this condition, an authen...
CVE-2020-0908
A remote code execution vulnerability exists when the Windows Text Service Module improperly handles memory. An attacker who successfully exploited the vulnerability could gain execution on a victim system.An attacker could host a specially crafted website that is designed to exploit the vulnerabil...
CVE-2020-0928
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker would have to log on to ...
CVE-2020-1129
A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or cre...
CVE-2020-1491
An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could...
CVE-2020-16973
An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.The ...