| CVE ID | Published | Description | Score | Severity |
|---|---|---|---|---|
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network. | 7.5 |
High |
||
| Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack. | 4.6 |
Medium |
||
| Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network. | 9.8 |
Critical |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network. | 3.1 |
Low |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Microsoft Failover Cluster Virtual Driver allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Insertion of sensitive information into log file in Active Directory Federation Services allows an unauthorized attacker to disclose information locally. | 6.2 |
Medium |
||
| Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally. | 5.5 |
Medium |
||
| External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network. | 7.1 |
High |
||
| Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use of uninitialized resource in Windows Management Services allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Use after free in Windows Remote Desktop Services allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Data Sharing Service Client allows an unauthorized attacker to perform spoofing locally. | 7.7 |
High |
||
| Improper access control in Software Protection Platform (SPP) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally. | 5 |
Medium |
||
| Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SSDP Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to deny service locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally. | 5.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Failover Cluster allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network. | 7.5 |
High |
||
| Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Heap-based buffer overflow in Windows DWM allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally. | 7.8 |
High |
||
| Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. | 4.7 |
Medium |
||
| Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Improper input validation in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Integer overflow or wraparound in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use of uninitialized resource in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network. | 8.1 |
High |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Use after free in Windows KDC Proxy Service (KPSSVC) allows an unauthorized attacker to execute code over a network. | 8.1 |
High |
||
| Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network. | 5.4 |
Medium |
||
| Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Remote Desktop Client allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network. | 7.5 |
High |
||
| Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally. | 7.8 |
High |
||
| Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network. | 5.7 |
Medium |
||
| Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Uncontrolled resource consumption in Windows Deployment Services allows an unauthorized attacker to deny service locally. | 6.2 |
Medium |
||
| Buffer over-read in Windows SMB allows an authorized attacker to disclose information over a network. | 5.4 |
Medium |
||
| Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. | 5.9 |
Medium |
||
| Acceptance of extraneous untrusted data with trusted data in UrlMon allows an unauthorized attacker to bypass a security feature over a network. | 7.5 |
High |
||
| Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Out-of-bounds read in Windows File Server allows an unauthorized attacker to disclose information locally. | 4 |
Medium |
||
| Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally. | 7.7 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. | 7.5 |
High |
||
| Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Use of uninitialized resource in Windows Trusted Runtime Interface Driver allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network. | 7.5 |
High |
||
| Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows DWM allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network. | 5.9 |
Medium |
||
| Improper privilege management in Windows Secure Kernel Mode allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network. | 7.5 |
High |
||
| Improper input validation in Active Directory Certificate Services (AD CS) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
| .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
| .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability | 7.3 |
High |
||
| An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows Graphics Component Information Disclosure Vulnerability'. | 4.3 |
Medium |
||
| An elevation of privilege vulnerability exists when the Windows IME improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows IME Elevation of Privilege Vulnerability'. | 7.8 |
High |
||
| An information disclosure vulnerability exists in the way that affected Microsoft browsers handle cross-origin requests, aka 'Microsoft Browser Information Disclosure Vulnerability'. | 4.3 |
Medium |
||
| An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. | 7.8 |
High |
||
| An elevation of privilege vulnerability exists when the Windows Wireless Network Manager improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Wireless Network Manager Elevation of Privilege Vulnerability'. | 7.8 |
High |
||
| An elevation of privilege vulnerability exists in the way that the Windows Client License Service (ClipSVC) handles objects in memory, aka 'Windows Client License Service Elevation of Privilege Vulnerability'. | 7.8 |
High |
||
| An information disclosure vulnerability exists when the Telephony Service improperly discloses the contents of its memory, aka 'Windows Information Disclosure Vulnerability'. | 5.5 |
Medium |
||
| A security feature bypass vulnerability exists in secure boot, aka 'Microsoft Secure Boot Security Feature Bypass Vulnerability'. | 6.7 |
Medium |
||
| An elevation of privilege vulnerability exists when Windows improperly handles COM object creation, aka 'Windows COM Server Elevation of Privilege Vulnerability'. | 7.8 |
High |
||
| An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0683. | 7.8 |
High |
||
| An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory, aka 'Windows Function Discovery Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0679, CVE-2020-0680. | 7.8 |
High |
||
| An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory, aka 'Windows Function Discovery Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0679, CVE-2020-0682. | 7.8 |
High |
||
| A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server, aka 'Remote Desktop Client Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0734. | 7.5 |
High |
||
| An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'. | 7.8 |
High |
||
| An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory, aka 'Windows Function Discovery Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0680, CVE-2020-0682. | 7.8 |
High |
||
| A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'. | 9.8 |
Critical |
||
| A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0605. | 8.8 |
High |
||
| A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0606. | 8.8 |
High |
||
| An elevation of privilege vulnerability exists in Windows Audio Service when a malformed parameter is processed, aka 'Windows Audio Service Elevation of Privilege Vulnerability'. | 7.8 |
High |
||
| An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it.To exploit the vulnerability, in a local attack scenario, an attacker could run a specially crafted application to elevate the attacker's privilege level, aka 'Windows NDIS Elevation of Privilege Vulnerability'. | 7 |
High |
||
| An elevation of privilege vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully decode and replace authentication request using Kerberos, allowing an attacker to be validated as an Administrator.The update addresses this vulnerability by changing how these requests are validated., aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0936. | 8.1 |
High |
||
| An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0882, CVE-2019-0961. | 6.5 |
Medium |
||
| A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client, aka 'Windows DHCP Client Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0698, CVE-2019-0726. | 9.8 |
Critical |
||
| A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client, aka 'Windows DHCP Client Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0697, CVE-2019-0726. | 9.8 |
Critical |
||
| A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client, aka 'Windows DHCP Client Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0697, CVE-2019-0698. | 9.8 |
Critical |