CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
External control of file name or path in WebDAV allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. | 7.8 |
High |
||
Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network. | 7.5 |
High |
||
Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally. | 7.8 |
High |
||
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network. | 5.7 |
Medium |
||
Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
Uncontrolled resource consumption in Windows Deployment Services allows an unauthorized attacker to deny service locally. | 6.2 |
Medium |
||
Buffer over-read in Windows SMB allows an authorized attacker to disclose information over a network. | 5.4 |
Medium |
||
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. | 5.9 |
Medium |
||
Acceptance of extraneous untrusted data with trusted data in UrlMon allows an unauthorized attacker to bypass a security feature over a network. | 7.5 |
High |
||
Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
Out-of-bounds read in Windows File Server allows an unauthorized attacker to disclose information locally. | 4 |
Medium |
||
Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally. | 7.7 |
High |
||
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
Use of uninitialized resource in Windows Trusted Runtime Interface Driver allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
Use after free in Windows DWM allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
Improper privilege management in Windows Secure Kernel Mode allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
Improper privilege management in Microsoft Office SharePoint allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network. | 7.5 |
High |
||
Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally. | 7 |
High |
||
Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally. | 7.8 |
High |
||
Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally. | 7.8 |
High |
||
Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack. | 4.6 |
Medium |
||
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability | 7.3 |
High |
||
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | 5.5 |
Medium |
||
.NET and Visual Studio Remote Code Execution Vulnerability | 7.8 |
High |
||
.NET Framework Denial of Service Vulnerability | 5 |
Medium |
||
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'. | 8.1 |
High |
||
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836. | 7.8 |
High |
||
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0806, CVE-2019-0812, CVE-2019-0829, CVE-2019-0860, CVE-2019-0861. | 7.5 |
High |
||
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8643. | 7.5 |
High |