| CVE ID | Published | Description | Score | Severity |
|---|---|---|---|---|
| Insertion of sensitive information into log file in Windows License Manager allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Insertion of sensitive information into log file in Windows License Manager allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack. | 4.6 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network. | 3.1 |
Low |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally. | 5.5 |
Medium |
||
| External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network. | 7.1 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Data Sharing Service Client allows an unauthorized attacker to perform spoofing locally. | 7.7 |
High |
||
| Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally. | 5 |
Medium |
||
| Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SSDP Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally. | 5.5 |
Medium |
||
| Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network. | 7.5 |
High |
||
| Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Improper input validation in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Integer overflow or wraparound in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Microsoft Windows allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Resilient File System (ReFS) allows an unauthorized attacker to elevate privileges locally. | 7.4 |
High |
||
| Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Missing Ability to Patch ROM Code in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.1 |
Medium |
||
| Use after free in Windows NTFS allows an unauthorized attacker to elevate privileges locally. | 7.4 |
High |
||
| Incomplete comparison with missing factors in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.1 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Buffer over-read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Use after free in Xbox allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks. The SMB Server already supports mechanisms for hardening against relay attacks: SMB Server signing SMB Server Extended Protection for Authentication (EPA) Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks. If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks: Assess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates. See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing & SMB Server EPA. Adopt appropriate SMB Server hardening measures. | 9.8 |
Critical |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to execute code locally. | 6.7 |
Medium |
||
| Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network. | 8.8 |
High |
||
| Protection mechanism failure in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. | 4.3 |
Medium |
||
| Stack-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally. | 7.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows UI XAML Maps MapControlSettings allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally. | 7.3 |
High |
||
| Integer overflow or wraparound in Windows SPNEGO Extended Negotiation allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Local Security Authority Subsystem Service Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Improper access control in Windows MultiPoint Services allows an authorized attacker to elevate privileges locally. | 7.3 |
High |
||
| Use after free in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows UI XAML Phone DatePickerFlyout allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. | 4.3 |
Medium |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Use after free in Windows SMBv3 Client allows an authorized attacker to execute code over a network. | 4.8 |
Medium |
||
| Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Time-of-check time-of-use (toctou) race condition in Windows TCP/IP allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Generation of error message containing sensitive information in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Untrusted pointer dereference in Windows DWM allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use of uninitialized resource in Windows Imaging Component allows an unauthorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Untrusted pointer dereference in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Missing authentication for critical function in Windows StateRepository API allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network. | 8.8 |
High |
||
| Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network. | 9.8 |
Critical |
||
| Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network. | 7.5 |
High |
||
| Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Desktop Windows Manager allows an authorized attacker to execute code locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network. | 8.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network. | 8.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network. | 8.8 |
High |
||
| Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Kernel Transaction Manager allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network. | 8.1 |
High |
||
| Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. | 7.3 |
High |
||
| Use after free in Remote Access Point-to-Point Protocol (PPP) EAP-TLS allows an authorized attacker to elevate privileges locally. | 7.3 |
High |
||
| Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally. | 7 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Integer overflow or wraparound in Microsoft Graphics Component allows an authorized attacker to execute code locally. | 7.8 |
High |
||
| Protection mechanism failure in Windows SmartScreen allows an unauthorized attacker to bypass a security feature over a network. | 8.8 |
High |
||
| Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Time-of-check time-of-use (toctou) race condition in Microsoft Windows QoS scheduler allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Uncontrolled resource consumption in Windows Print Spooler Components allows an authorized attacker to deny service over an adjacent network. | 5.7 |
Medium |
||
| Buffer over-read in Storage Port Driver allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to execute code locally. | 7.8 |
High |
||
| Improper link resolution before file access ('link following') in Windows Performance Recorder allows an authorized attacker to deny service locally. | 7.3 |
High |
||
| Numeric truncation error in Windows Shell allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Null pointer dereference in Windows NTFS allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Double free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Workspace Broker allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows User-Mode Driver Framework Host allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Use after free in Windows Event Tracing allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Cryptographic issues in Windows Cryptographic Services allows an unauthorized attacker to disclose information over a network. | 5.9 |
Medium |
||
| Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over an adjacent network. | 7.1 |
High |
||
| Improper link resolution before file access ('link following') in Windows AppX Deployment Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over an adjacent network. | 7.1 |
High |
||
| Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.8 |
Medium |
||
| Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Integer overflow or wraparound in HID class driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows SSDP Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Missing support for integrity check in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Use after free in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Microsoft MPEG-2 Video Extension allows an authorized attacker to execute code locally. | 7.8 |
High |
||
| Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.8 |
Medium |
||
| Missing support for integrity check in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.8 |
Medium |
||
| Time-of-check time-of-use (toctou) race condition in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.8 |
Medium |
||
| Integer underflow (wrap or wraparound) in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a network. | 9.8 |
Critical |
||
| Exposure of sensitive information to an unauthorized actor in Windows Imaging Component allows an unauthorized attacker to disclose information locally. | 6.2 |
Medium |
||
| Double free in Windows SSDP Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally. | 7.8 |
High |
||
| External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network. | 3.5 |
Low |
||
| Heap-based buffer overflow in Windows Fast FAT Driver allows an unauthorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over an adjacent network. | 8 |
High |
||
| Integer overflow or wraparound in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Null pointer dereference in Windows TCP/IP allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows TDX.sys allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Universal Print Management Service allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Untrusted pointer dereference in Windows Event Tracing allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Protection mechanism failure in Windows GDI allows an unauthorized attacker to disclose information over a network. | 7.5 |
High |
||
| Use after free in Windows SSDP Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Input Method Editor (IME) allows an authorized attacker to elevate privileges over a network. | 8 |
High |
||
| Buffer over-read in Virtual Hard Disk (VHDX) allows an unauthorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use of uninitialized resource in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network. | 8.1 |
High |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network. | 5.4 |
Medium |
||
| Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Remote Desktop Client allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image. | 4.6 |
Medium |