| CVE ID | Published | Description | Score | Severity |
|---|---|---|---|---|
| Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. | 8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Insertion of sensitive information into log file in Windows License Manager allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Insertion of sensitive information into log file in Windows License Manager allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network. | 9.8 |
Critical |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to deny service over a network. | 6.3 |
Medium |
||
| Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Untrusted pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. | 8 |
High |
||
| Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Untrusted pointer dereference in Storvsp.sys Driver allows an authorized attacker to deny service locally. | 6.5 |
Medium |
||
| Use after free in Multimedia Class Scheduler Service (MMCSS) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Hyper-V allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper access control in Windows Client-Side Caching (CSC) Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Missing cryptographic step in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network. | 7.5 |
High |
||
| Untrusted pointer dereference in Windows Remote Desktop allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows Broadcast DVR User Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Improper privilege management in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper access control in Customer Experience Improvement Program (CEIP) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| External control of file name or path in Windows WLAN Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper link resolution before file access ('link following') in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to deny service locally. | 5.5 |
Medium |
||
| Insertion of sensitive information into sent data in Windows Speech allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Speech allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Speech allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Double free in Windows Smart Card allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network. | 7.5 |
High |
||
| Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack. | 4.6 |
Medium |
||
| Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network. | 9.8 |
Critical |
||
| Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally. | 5.5 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network. | 3.1 |
Low |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Microsoft Failover Cluster Virtual Driver allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Insertion of sensitive information into log file in Active Directory Federation Services allows an unauthorized attacker to disclose information locally. | 6.2 |
Medium |
||
| Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally. | 5.5 |
Medium |
||
| External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability | 7.4 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network. | 7.1 |
High |
||
| Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability | 7.4 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use of uninitialized resource in Windows Management Services allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Use after free in Windows Remote Desktop Services allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Data Sharing Service Client allows an unauthorized attacker to perform spoofing locally. | 7.7 |
High |
||
| Improper access control in Software Protection Platform (SPP) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally. | 5 |
Medium |
||
| Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SSDP Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to deny service locally. | 7 |
High |
||
| Use of uninitialized resource in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally. | 5.5 |
Medium |
||
| Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally. | 7.4 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows Failover Cluster allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. | 6.5 |
Medium |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 7 |
High |
||
| Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network. | 7.5 |
High |
||
| Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Heap-based buffer overflow in Windows DWM allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally. | 7.8 |
High |
||
| Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. | 4.7 |
Medium |
||
| Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Improper input validation in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Integer overflow or wraparound in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper validation of specified type of input in Microsoft Windows allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Null pointer dereference in Windows DirectX allows an authorized attacker to deny service over a network. | 7.7 |
High |
||
| Heap-based buffer overflow in Azure Local allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Time-of-check time-of-use (toctou) race condition in NtQueryInformation Token function (ntifs.h) allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper access control in Windows Error Reporting allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows Kernel allows an unauthorized attacker to elevate privileges locally. | 7.4 |
High |
||
| Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Resilient File System (ReFS) allows an unauthorized attacker to elevate privileges locally. | 7.4 |
High |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.1 |
Medium |
||
| Out-of-bounds read in Windows DWM allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Time-of-check time-of-use (toctou) race condition in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Improper input validation in Windows Kernel allows an unauthorized attacker to disclose information locally. | 5.1 |
Medium |
||
| Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Untrusted pointer dereference in Windows Device Association Broker service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Generation of error message containing sensitive information in Windows USB Video Driver allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Improper authentication in Windows Remote Desktop Protocol allows an authorized attacker to bypass a security feature locally. | 7 |
High |
||
| Out-of-bounds read in Windows NDIS allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Missing Ability to Patch ROM Code in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.1 |
Medium |
||
| Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.1 |
Medium |
||
| Exposure of sensitive information to an unauthorized actor in Windows Cloud Files Mini Filter Driver allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Use after free in Windows NTFS allows an unauthorized attacker to elevate privileges locally. | 7.4 |
High |
||
| Incomplete comparison with missing factors in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.1 |
Medium |
||
| Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.1 |
Medium |
||
| Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. | 6.1 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Connected Devices Platform Service (Cdpsvc) allows an unauthorized attacker to execute code over a network. | 7.5 |
High |
||
| Buffer over-read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally. | 7.7 |
High |
||
| Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows Device Association Broker service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges over a network. | 9.9 |
Critical |
||
| Use of a key past its expiration date in Virtual Secure Mode allows an authorized attacker to perform spoofing locally. | 6.3 |
Medium |
||
| Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally. | 7.4 |
High |
||
| Insertion of sensitive information into log file in Windows Failover Cluster allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Time-of-check time-of-use (toctou) race condition in Graphics Kernel allows an authorized attacker to execute code locally. | 7.8 |
High |
||
| SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks. The SMB Server already supports mechanisms for hardening against relay attacks: SMB Server signing SMB Server Extended Protection for Authentication (EPA) Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks. If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks: Assess your environment by utilizing the audit capabilities that we are exposing in the September 2025 security updates. See Support for Audit Events to deploy SMB Server Hardening—SMB Server Signing & SMB Server EPA. Adopt appropriate SMB Server hardening measures. | 9.8 |
Critical |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to execute code locally. | 6.7 |
Medium |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally. | 7.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally. | 7.5 |
High |
||
| Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network. | 8.8 |
High |
||
| Protection mechanism failure in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. | 4.3 |
Medium |
||
| Stack-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally. | 7.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows UI XAML Maps MapControlSettings allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally. | 7.3 |
High |
||
| Integer overflow or wraparound in Windows SPNEGO Extended Negotiation allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Local Security Authority Subsystem Service Elevation of Privilege Vulnerability | 7.8 |
High |
||
| Improper access control in Windows MultiPoint Services allows an authorized attacker to elevate privileges locally. | 7.3 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Use after free in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Use after free in Windows UI XAML Phone DatePickerFlyout allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally. | 8.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. | 4.3 |
Medium |
||
| Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. | 8.8 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Use after free in Windows Management Services allows an unauthorized attacker to elevate privileges locally. | 7.4 |
High |
||
| Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Time-of-check time-of-use (toctou) race condition in Windows TCP/IP allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Improper input validation in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to deny service over a network. | 6.5 |
Medium |
||
| Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. | 6.7 |
Medium |
||
| Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Out-of-bounds read in Windows Internet Information Services allows an unauthorized attacker to deny service over a network. | 7.5 |
High |
||
| Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Generation of error message containing sensitive information in Windows Kernel allows an authorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| No cwe for this issue in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. | 7.8 |
High |
||
| Use of uninitialized resource in Windows Imaging Component allows an unauthorized attacker to disclose information locally. | 5.5 |
Medium |
||
| Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. | 6.5 |
Medium |
||
| Improper restriction of communication channel to intended endpoints in Windows PowerShell allows an authorized attacker to elevate privileges locally. | 7 |
High |
||
| In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image. | 4.6 |
Medium |