| CVE ID | Published | Description | Score | Severity |
|---|---|---|---|---|
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network. | 7.5 |
High |
||
| Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack. | 4.6 |
Medium |
||
| Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network. | 3.1 |
Low |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally. | 5.5 |
Medium |
||
| External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network. | 7.1 |
High |
||
| Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use of uninitialized resource in Windows Management Services allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Use after free in Windows Remote Desktop Services allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Data Sharing Service Client allows an unauthorized attacker to perform spoofing locally. | 7.7 |
High |
||
| Improper access control in Software Protection Platform (SPP) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally. | 5 |
Medium |
||
| Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SSDP Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to deny service locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally. | 5.5 |
Medium |
||
| Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network. | 7.5 |
High |
||
| Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Heap-based buffer overflow in Windows DWM allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally. | 7.8 |
High |
||
| Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. | 4.7 |
Medium |
||
| Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Improper input validation in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Integer overflow or wraparound in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Microsoft Windows allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Time-of-check time-of-use (toctou) race condition in NtQueryInformation Token function (ntifs.h) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Resilient File System (ReFS) allows an unauthorized attacker to elevate privileges locally. | 7.4 |
High |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Out-of-bounds read in Windows DWM allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Time-of-check time-of-use (toctou) race condition in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Windows Kernel allows an unauthorized attacker to disclose information locally. | 5.1 |
Medium |
||
| Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use of uninitialized resource in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network. | 8.1 |
High |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network. | 5.4 |
Medium |
||
| Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Remote Desktop Client allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network. | 7.5 |
High |
||
| Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally. | 7.8 |
High |
||
| Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network. | 5.7 |
Medium |
||
| Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Uncontrolled resource consumption in Windows Deployment Services allows an unauthorized attacker to deny service locally. | 6.2 |
Medium |
||
| Buffer over-read in Windows SMB allows an authorized attacker to disclose information over a network. | 5.4 |
Medium |
||
| Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. | 5.9 |
Medium |
||
| Acceptance of extraneous untrusted data with trusted data in UrlMon allows an unauthorized attacker to bypass a security feature over a network. | 7.5 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Universal Print Management Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Out-of-bounds read in Windows File Server allows an unauthorized attacker to disclose information locally. | 4 |
Medium |
||
| Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally. | 7.7 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Use of uninitialized resource in Windows Trusted Runtime Interface Driver allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows DWM allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper privilege management in Windows Secure Kernel Mode allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network. | 7.5 |
High |
||
| Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally. | 7 |
High |
||
| Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally. | 7.8 |
High |
||
| Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack. | 4.6 |
Medium |
||
| External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Windows Installer Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows Core Messaging Elevation of Privileges Vulnerability | 7 |
High |
||
| Internet Connection Sharing (ICS) Denial of Service Vulnerability | 6.5 |
Medium |
||
| Internet Connection Sharing (ICS) Denial of Service Vulnerability | 6.5 |
Medium |
||
| Internet Connection Sharing (ICS) Denial of Service Vulnerability | 6.5 |
Medium |
||
| Windows Core Messaging Elevation of Privileges Vulnerability | 7 |
High |
||
| Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | 7.5 |
High |
||
| NTLM Hash Disclosure Spoofing Vulnerability | 6.5 |
Medium |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Kerberos Denial of Service Vulnerability | 5.9 |
Medium |
||
| Windows Remote Desktop Configuration Service Tampering Vulnerability | 6.8 |
Medium |
||
| Windows Deployment Services Denial of Service Vulnerability | 6 |
Medium |
||
| Windows NTFS Elevation of Privilege Vulnerability | 3.3 |
Low |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Disk Cleanup Tool Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows Setup Files Cleanup Elevation of Privilege Vulnerability | 7.1 |
High |
||
| Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows Storage Elevation of Privilege Vulnerability | 7.1 |
High |
||
| Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | 8.1 |
High |
||
| Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Microsoft Digest Authentication Remote Code Execution Vulnerability | 8.8 |
High |
||
| Microsoft Digest Authentication Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Secure Kernel Mode Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| MapUrlToZone Security Feature Bypass Vulnerability | 8.8 |
High |
||
| Windows CSC Service Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows CSC Service Information Disclosure Vulnerability | 5.5 |
Medium |
||
| Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability | 5.5 |
Medium |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| GDI+ Remote Code Execution Vulnerability | 7.8 |
High |
||
| Windows Cryptographic Information Disclosure Vulnerability | 5.6 |
Medium |
||
| Windows Installer Elevation of Privilege Vulnerability | 7.3 |
High |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Kernel Memory Information Disclosure Vulnerability | 5.5 |
Medium |
||
| Windows Kernel Memory Information Disclosure Vulnerability | 5.5 |
Medium |
||
| Windows Smart Card Reader Information Disclosure Vulnerability | 2.4 |
Low |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Themes Spoofing Vulnerability | 6.5 |
Medium |
||
| Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability | 9.8 |
Critical |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows upnphost.dll Denial of Service Vulnerability | 7.5 |
High |
||
| Windows Search Service Elevation of Privilege Vulnerability | 8.8 |
High |
||
| Windows Installer Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows MapUrlToZone Denial of Service Vulnerability | 7.5 |
High |
||
| Windows App Package Installer Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows Event Tracing Denial of Service Vulnerability | 5.5 |
Medium |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| MapUrlToZone Security Feature Bypass Vulnerability | 4.3 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| IP Helper Denial of Service Vulnerability | 7.5 |
High |
||
| Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | 7.5 |
High |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability | 8.1 |
High |
||
| Secure Boot Security Feature Bypass Vulnerability | 4.6 |
Medium |
||
| Secure Boot Security Feature Bypass Vulnerability | 6.8 |
Medium |
||
| Windows Recovery Environment Agent Elevation of Privilege Vulnerability | 6.1 |
Medium |
||
| Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability | 7.5 |
High |
||
| Microsoft Message Queuing Information Disclosure Vulnerability | 7.5 |
High |
||
| Windows Remote Desktop Services Denial of Service Vulnerability | 7.5 |
High |
||
| MapUrlToZone Security Feature Bypass Vulnerability | 4.3 |
Medium |
||
| MapUrlToZone Security Feature Bypass Vulnerability | 4.3 |
Medium |
||
| Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability | 6.2 |
Medium |
||
| Windows NTLM Spoofing Vulnerability | 6.5 |
Medium |
||
| Windows upnphost.dll Denial of Service Vulnerability | 7.5 |
High |
||
| MapUrlToZone Security Feature Bypass Vulnerability | 4.3 |
Medium |
||
| Windows Graphics Component Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Kernel Memory Information Disclosure Vulnerability | 5.5 |
Medium |
||
| Windows Kernel Memory Information Disclosure Vulnerability | 5.5 |
Medium |
||
| Windows Kernel Memory Information Disclosure Vulnerability | 5.5 |
Medium |
||
| Windows Kernel Memory Information Disclosure Vulnerability | 5.5 |
Medium |
||
| Windows Kernel Memory Information Disclosure Vulnerability | 5.5 |
Medium |
||
| Windows SmartScreen Spoofing Vulnerability | 6.5 |
Medium |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Microsoft DWM Core Library Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Geolocation Service Information Disclosure Vulnerability | 6.5 |
Medium |
||
| Windows Kerberos Security Feature Bypass Vulnerability | 7.8 |
High |
||
| Windows OLE Remote Code Execution Vulnerability | 9.8 |
Critical |
||
| BranchCache Remote Code Execution Vulnerability | 7.5 |
High |
||
| SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability | 8.1 |
High |
||
| Microsoft Digest Authentication Remote Code Execution Vulnerability | 8.1 |
High |
||
| Active Directory Domain Services Elevation of Privilege Vulnerability | 8.8 |
High |
||
| Windows Direct Show Remote Code Execution Vulnerability | 8.8 |
High |
||
| Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | 7.5 |
High |
||
| Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | 7.5 |
High |
||
| Windows COM Server Information Disclosure Vulnerability | 6.5 |
Medium |
||
| Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | 7.5 |
High |
||
| Windows Virtual Trusted Platform Module Denial of Service Vulnerability | 5.5 |
Medium |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Microsoft COM for Windows Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows Virtual Trusted Platform Module Denial of Service Vulnerability | 5.5 |
Medium |
||
| Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | 7.5 |
High |
||
| Windows COM Server Information Disclosure Vulnerability | 6.5 |
Medium |
||
| Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | 7.5 |
High |
||
| Windows HTML Platforms Security Feature Bypass Vulnerability | 4.3 |
Medium |
||
| MapUrlToZone Security Feature Bypass Vulnerability | 4.3 |
Medium |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows WLAN AutoConfig Service Information Disclosure Vulnerability | 5.5 |
Medium |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | 7.5 |
High |
||
| Windows Digital Media Elevation of Privilege Vulnerability | 6.6 |
Medium |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Kerberos Information Disclosure Vulnerability | 5.9 |
Medium |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Secure Boot Security Feature Bypass Vulnerability | 4.6 |
Medium |
||
| Windows BitLocker Information Disclosure Vulnerability | 4.2 |
Medium |
||
| Windows BitLocker Information Disclosure Vulnerability | 4.2 |
Medium |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| Windows Telephony Service Remote Code Execution Vulnerability | 8.8 |
High |
||
| .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
| .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | 7.5 |
High |
||
| .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability | 7.3 |
High |
||
| Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | 5.5 |
Medium |
||
| .NET and Visual Studio Remote Code Execution Vulnerability | 7.8 |
High |
||
| .NET Framework Denial of Service Vulnerability | 5 |
Medium |