| CVE ID | Published | Description | Score | Severity | 
|---|---|---|---|---|
| Use of uninitialized resource in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network. | 8.1 | High | ||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network. | 8.8 | High | ||
| Exposure of sensitive information to an unauthorized actor in Windows Hello allows an authorized attacker to disclose information locally. | 4.4 | Medium | ||
| Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. | 7.8 | High | ||
| Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network. | 5.4 | Medium | ||
| Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally. | 7.8 | High | ||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Out-of-bounds read in Remote Desktop Client allows an unauthorized attacker to disclose information over a network. | 6.5 | Medium | ||
| Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 | High | ||
| Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network. | 7.5 | High | ||
| Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally. | 7.8 | High | ||
| Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 | High | ||
| Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network. | 5.7 | Medium | ||
| Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 | High | ||
| Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 | High | ||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 | Medium | ||
| Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 | Medium | ||
| Uncontrolled resource consumption in Windows Deployment Services allows an unauthorized attacker to deny service locally. | 6.2 | Medium | ||
| Buffer over-read in Windows SMB allows an authorized attacker to disclose information over a network. | 5.4 | Medium | ||
| Improper input validation in Windows Hyper-V allows an unauthorized attacker to deny service locally. | 6.2 | Medium | ||
| Acceptance of extraneous untrusted data with trusted data in UrlMon allows an unauthorized attacker to bypass a security feature over a network. | 7.5 | High | ||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Universal Print Management Service allows an authorized attacker to elevate privileges locally. | 7 | High | ||
| Out-of-bounds read in Windows File Server allows an unauthorized attacker to disclose information locally. | 4 | Medium | ||
| Null pointer dereference in Windows Drivers allows an unauthorized attacker to elevate privileges locally. | 7.4 | High | ||
| Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 | Medium | ||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 | Medium | ||
| Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally. | 7.7 | High | ||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 | Medium | ||
| Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 | Medium | ||
| Use of uninitialized resource in Windows Trusted Runtime Interface Driver allows an authorized attacker to disclose information locally. | 5.5 | Medium | ||
| Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 | High | ||
| Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 | High | ||
| Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 | High | ||
| Use after free in Windows DWM allows an authorized attacker to elevate privileges locally. | 7.8 | High | ||
| Improper privilege management in Windows Secure Kernel Mode allows an authorized attacker to elevate privileges locally. | 7 | High | ||
| Out-of-bounds read in Web Threat Defense (WTD.sys) allows an unauthorized attacker to deny service over a network. | 7.5 | High | ||
| Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally. | 7.8 | High | ||
| Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network. | 7.5 | High | ||
| Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. | 8.8 | High | ||
| Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network. | 8.8 | High | ||
| Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 | High | ||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 | Medium | ||
| Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 | Medium | ||
| Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 | High | ||
| Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally. | 7.8 | High | ||
| Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack. | 4.6 | Medium |