Microsoft Windows 10 2004 on x64

CPE Details

Microsoft Windows 10 2004 on x64
2004
2020-06-16 13:08 +00:00
2022-12-09 17:15 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*

Informations

Vendor

microsoft

Product

windows_10

Version

2004

Target Hardware

x64

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-24505 2022-03-09 16:08 +00:00 Windows ALPC Elevation of Privilege Vulnerability
7
HIGH
CVE-2022-24503 2022-03-09 16:07 +00:00 Remote Desktop Protocol Client Information Disclosure Vulnerability
5.4
MEDIUM
CVE-2022-24502 2022-03-09 16:07 +00:00 Windows HTML Platforms Security Feature Bypass Vulnerability
6.5
MEDIUM
CVE-2021-43893 2021-12-15 13:15 +00:00 Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
7.5
HIGH
CVE-2021-43883 2021-12-15 13:15 +00:00 Windows Installer Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43248 2021-12-15 13:15 +00:00 Windows Digital Media Receiver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43247 2021-12-15 13:15 +00:00 Windows TCP/IP Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43246 2021-12-15 13:15 +00:00 Windows Hyper-V Denial of Service Vulnerability
5.6
MEDIUM
CVE-2021-43244 2021-12-15 13:15 +00:00 Windows Kernel Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-43239 2021-12-15 13:15 +00:00 Windows Recovery Environment Agent Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43240 2021-12-15 13:15 +00:00 NTFS Set Short Name Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43238 2021-12-15 13:15 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43237 2021-12-15 13:15 +00:00 Windows Setup Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43235 2021-12-15 13:15 +00:00 Storage Spaces Controller Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-43236 2021-12-15 13:15 +00:00 Microsoft Message Queuing Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-43234 2021-12-15 13:15 +00:00 Windows Fax Service Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-43233 2021-12-15 13:15 +00:00 Remote Desktop Client Remote Code Execution Vulnerability
7.5
HIGH
CVE-2021-43231 2021-12-15 13:15 +00:00 Windows NTFS Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43232 2021-12-15 13:15 +00:00 Windows Event Tracing Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-43230 2021-12-15 13:15 +00:00 Windows NTFS Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43229 2021-12-15 13:15 +00:00 Windows NTFS Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43228 2021-12-15 13:15 +00:00 SymCrypt Denial of Service Vulnerability
7.5
HIGH
CVE-2021-43226 2021-12-15 13:15 +00:00 Windows Common Log File System Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43227 2021-12-15 13:15 +00:00 Storage Spaces Controller Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-43224 2021-12-15 13:15 +00:00 Windows Common Log File System Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-43222 2021-12-15 13:15 +00:00 Microsoft Message Queuing Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-43223 2021-12-15 13:15 +00:00 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-43219 2021-12-15 13:15 +00:00 DirectX Graphics Kernel File Denial of Service Vulnerability
7.5
HIGH
CVE-2021-43217 2021-12-15 13:15 +00:00 Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
9.8
CRITICAL
CVE-2021-43216 2021-12-15 13:15 +00:00 Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-43215 2021-12-15 13:15 +00:00 iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution
9.8
CRITICAL
CVE-2021-43207 2021-12-15 13:15 +00:00 Windows Common Log File System Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41333 2021-12-15 13:14 +00:00 Windows Print Spooler Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38505 2021-12-08 20:21 +00:00 Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.
6.5
MEDIUM
CVE-2021-42288 2021-11-09 23:47 +00:00 Windows Hello Security Feature Bypass Vulnerability
6.1
MEDIUM
CVE-2021-42286 2021-11-09 23:47 +00:00 Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-42285 2021-11-09 23:47 +00:00 Windows Kernel Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-42284 2021-11-09 23:47 +00:00 Windows Hyper-V Denial of Service Vulnerability
7.5
HIGH
CVE-2021-42283 2021-11-09 23:47 +00:00 NTFS Elevation of Privilege Vulnerability
8.8
HIGH
CVE-2021-42280 2021-11-09 23:47 +00:00 Windows Feedback Hub Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-42279 2021-11-09 23:47 +00:00 Chakra Scripting Engine Memory Corruption Vulnerability
7.5
HIGH
CVE-2021-42277 2021-11-09 23:47 +00:00 Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-42276 2021-11-09 23:47 +00:00 Microsoft Windows Media Foundation Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-42275 2021-11-09 23:46 +00:00 Microsoft COM for Windows Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-42274 2021-11-09 23:46 +00:00 Windows Hyper-V Discrete Device Assignment (DDA) Denial of Service Vulnerability
6.8
MEDIUM
CVE-2021-41378 2021-11-09 23:46 +00:00 Windows NTFS Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-41377 2021-11-09 23:46 +00:00 Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41371 2021-11-09 23:46 +00:00 Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
4.4
MEDIUM
CVE-2021-41370 2021-11-09 23:46 +00:00 NTFS Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41367 2021-11-09 23:46 +00:00 NTFS Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41366 2021-11-09 23:46 +00:00 Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41356 2021-11-09 23:46 +00:00 Windows Denial of Service Vulnerability
7.5
HIGH
CVE-2021-41351 2021-11-09 23:46 +00:00 Microsoft Edge (Chrome based) Spoofing on IE Mode
4.3
MEDIUM
CVE-2021-38666 2021-11-09 23:46 +00:00 Remote Desktop Client Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-38665 2021-11-09 23:46 +00:00 Remote Desktop Protocol Client Information Disclosure Vulnerability
7.4
HIGH
CVE-2021-38631 2021-11-09 23:46 +00:00 Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
4.4
MEDIUM
CVE-2021-36957 2021-11-09 23:46 +00:00 Windows Desktop Bridge Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41347 2021-10-12 22:28 +00:00 Windows AppX Deployment Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41346 2021-10-12 22:28 +00:00 Console Window Host Security Feature Bypass Vulnerability
7.8
HIGH
CVE-2021-41345 2021-10-12 22:28 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41343 2021-10-12 22:28 +00:00 Windows Fast FAT File System Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-41342 2021-10-12 22:28 +00:00 Windows MSHTML Platform Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-41340 2021-10-12 22:27 +00:00 Windows Graphics Component Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-41339 2021-10-12 22:27 +00:00 Microsoft DWM Core Library Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41338 2021-10-12 22:27 +00:00 Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability
5.5
MEDIUM
CVE-2021-41335 2021-10-12 22:27 +00:00 Windows Kernel Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41334 2021-10-12 22:27 +00:00 Windows Desktop Bridge Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-41332 2021-10-12 22:27 +00:00 Windows Print Spooler Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-41331 2021-10-12 22:27 +00:00 Windows Media Audio Decoder Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-41330 2021-10-12 22:27 +00:00 Microsoft Windows Media Foundation Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-40489 2021-10-12 22:27 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-40488 2021-10-12 22:27 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-40478 2021-10-12 22:27 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-40477 2021-10-12 22:27 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-40476 2021-10-12 22:27 +00:00 Windows AppContainer Elevation Of Privilege Vulnerability
7.8
HIGH
CVE-2021-40475 2021-10-12 22:27 +00:00 Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-40470 2021-10-12 22:27 +00:00 DirectX Graphics Kernel Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-40468 2021-10-12 22:27 +00:00 Windows Bind Filter Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-40467 2021-10-12 22:27 +00:00 Windows Common Log File System Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-40466 2021-10-12 22:27 +00:00 Windows Common Log File System Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-40465 2021-10-12 22:27 +00:00 Windows Text Shaping Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-40464 2021-10-12 22:27 +00:00 Windows Nearby Sharing Elevation of Privilege Vulnerability
8
HIGH
CVE-2021-40463 2021-10-12 22:27 +00:00 Windows Network Address Translation (NAT) Denial of Service Vulnerability
7.7
HIGH
CVE-2021-40462 2021-10-12 22:27 +00:00 Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-40461 2021-10-12 22:26 +00:00 Windows Hyper-V Remote Code Execution Vulnerability
9
CRITICAL
CVE-2021-40460 2021-10-12 22:26 +00:00 Windows Remote Procedure Call Runtime Security Feature Bypass Vulnerability
6.5
MEDIUM
CVE-2021-40455 2021-10-12 22:26 +00:00 Windows Installer Spoofing Vulnerability
5.5
MEDIUM
CVE-2021-40454 2021-10-12 22:26 +00:00 Rich Text Edit Control Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-40443 2021-10-12 22:26 +00:00 Windows Common Log File System Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38663 2021-10-12 22:26 +00:00 Windows exFAT File System Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-38662 2021-10-12 22:26 +00:00 Windows Fast FAT File System Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-36970 2021-10-12 22:26 +00:00 Windows Print Spooler Spoofing Vulnerability
8.8
HIGH
CVE-2021-36953 2021-10-12 22:26 +00:00 Windows TCP/IP Denial of Service Vulnerability
7.5
HIGH
CVE-2021-26442 2021-10-12 22:26 +00:00 Windows HTTP.sys Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26441 2021-10-12 22:26 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-40447 2021-09-15 09:24 +00:00 Windows Print Spooler Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38671 2021-09-15 09:24 +00:00 Windows Print Spooler Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38667 2021-09-15 09:24 +00:00 Windows Print Spooler Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38639 2021-09-15 09:24 +00:00 Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38637 2021-09-15 09:23 +00:00 Windows Storage Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-38638 2021-09-15 09:23 +00:00 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38636 2021-09-15 09:23 +00:00 Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-38635 2021-09-15 09:23 +00:00 Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-38634 2021-09-15 09:23 +00:00 Microsoft Windows Update Client Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38633 2021-09-15 09:23 +00:00 Windows Common Log File System Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38632 2021-09-15 09:23 +00:00 BitLocker Security Feature Bypass Vulnerability
5.7
MEDIUM
CVE-2021-38630 2021-09-15 09:23 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38629 2021-09-15 09:23 +00:00 Windows Ancillary Function Driver for WinSock Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-38628 2021-09-15 09:23 +00:00 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-38624 2021-09-15 09:23 +00:00 Windows Key Storage Provider Security Feature Bypass Vulnerability
6.5
MEDIUM
CVE-2021-36975 2021-09-15 09:23 +00:00 Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-36974 2021-09-15 09:23 +00:00 Windows SMB Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-36973 2021-09-15 09:23 +00:00 Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-36972 2021-09-15 09:23 +00:00 Windows SMB Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-36969 2021-09-15 09:23 +00:00 Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-36966 2021-09-15 09:23 +00:00 Windows Subsystem for Linux Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-36967 2021-09-15 09:23 +00:00 Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
8.8
HIGH
CVE-2021-36965 2021-09-15 09:23 +00:00 Windows WLAN AutoConfig Service Remote Code Execution Vulnerability
9.8
CRITICAL
CVE-2021-36964 2021-09-15 09:23 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-36963 2021-09-15 09:23 +00:00 Windows Common Log File System Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-36962 2021-09-15 09:23 +00:00 Windows Installer Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-36961 2021-09-15 09:23 +00:00 Windows Installer Denial of Service Vulnerability
6.1
MEDIUM
CVE-2021-36960 2021-09-15 09:23 +00:00 Windows SMB Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-36959 2021-09-15 09:23 +00:00 Windows Authenticode Spoofing Vulnerability
5.5
MEDIUM
CVE-2021-36954 2021-09-15 09:23 +00:00 Windows Bind Filter Driver Elevation of Privilege Vulnerability
8.8
HIGH
CVE-2021-26435 2021-09-15 09:23 +00:00 Windows Scripting Engine Memory Corruption Vulnerability
8.1
HIGH
CVE-2021-36947 2021-08-12 16:12 +00:00 Windows Print Spooler Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-36937 2021-08-12 16:12 +00:00 Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-36936 2021-08-12 16:12 +00:00 Windows Print Spooler Remote Code Execution Vulnerability
9.8
CRITICAL
CVE-2021-36933 2021-08-12 16:12 +00:00 Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-36932 2021-08-12 16:12 +00:00 Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-36926 2021-08-12 16:12 +00:00 Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-34537 2021-08-12 16:12 +00:00 Windows Bluetooth Driver Elevation of Privilege Vulnerability
8
HIGH
CVE-2021-34536 2021-08-12 16:12 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34535 2021-08-12 16:12 +00:00 Remote Desktop Client Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-34534 2021-08-12 16:12 +00:00 Windows MSHTML Platform Remote Code Execution Vulnerability
7.5
HIGH
CVE-2021-34533 2021-08-12 16:12 +00:00 Windows Graphics Component Font Parsing Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-34530 2021-08-12 16:12 +00:00 Windows Graphics Component Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-34487 2021-08-12 16:12 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34483 2021-08-12 16:11 +00:00 Windows Print Spooler Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34480 2021-08-12 16:11 +00:00 Scripting Engine Memory Corruption Vulnerability
8.8
HIGH
CVE-2021-26433 2021-08-12 16:11 +00:00 Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-26432 2021-08-12 16:11 +00:00 Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability
9.8
CRITICAL
CVE-2021-26431 2021-08-12 16:11 +00:00 Windows Recovery Environment Agent Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26426 2021-08-12 16:11 +00:00 Windows User Account Profile Picture Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26425 2021-08-12 16:11 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26424 2021-08-12 16:11 +00:00 Windows TCP/IP Remote Code Execution Vulnerability
9.9
CRITICAL
CVE-2021-34481 2021-07-16 18:19 +00:00

A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

UPDATE August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see KB5005652.

9.8
CRITICAL
CVE-2021-34466 2021-07-16 18:19 +00:00 Windows Hello Security Feature Bypass Vulnerability
6.1
MEDIUM
CVE-2021-34462 2021-07-16 18:19 +00:00 Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34461 2021-07-16 18:19 +00:00 Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34460 2021-07-16 18:19 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34459 2021-07-16 18:19 +00:00 Windows AppContainer Elevation Of Privilege Vulnerability
7.8
HIGH
CVE-2021-34457 2021-07-16 18:19 +00:00 Windows Remote Access Connection Manager Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-34456 2021-07-16 18:19 +00:00 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34454 2021-07-16 18:19 +00:00 Windows Remote Access Connection Manager Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-34455 2021-07-16 18:19 +00:00 Windows File History Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34450 2021-07-16 18:19 +00:00 Windows Hyper-V Remote Code Execution Vulnerability
9.9
CRITICAL
CVE-2021-34449 2021-07-16 18:19 +00:00 Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34447 2021-07-16 18:19 +00:00 Windows MSHTML Platform Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-34446 2021-07-16 18:19 +00:00 Windows HTML Platforms Security Feature Bypass Vulnerability
8.8
HIGH
CVE-2021-34445 2021-07-16 18:19 +00:00 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34441 2021-07-16 18:19 +00:00 Microsoft Windows Media Foundation Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-34440 2021-07-16 18:19 +00:00 GDI+ Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-34438 2021-07-16 18:19 +00:00 Windows Font Driver Host Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-34516 2021-07-14 15:54 +00:00 Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34514 2021-07-14 15:54 +00:00 Windows Kernel Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34513 2021-07-14 15:54 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34512 2021-07-14 15:54 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34511 2021-07-14 15:54 +00:00 Windows Installer Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34510 2021-07-14 15:54 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34509 2021-07-14 15:54 +00:00 Storage Spaces Controller Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-34508 2021-07-14 15:54 +00:00 Windows Kernel Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-34507 2021-07-14 15:54 +00:00 Windows Remote Assistance Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-34504 2021-07-14 15:54 +00:00 Windows Address Book Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-34500 2021-07-14 15:54 +00:00 Windows Kernel Memory Information Disclosure Vulnerability
7.7
HIGH
CVE-2021-34498 2021-07-14 15:54 +00:00 Windows GDI Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34497 2021-07-14 15:54 +00:00 Windows MSHTML Platform Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-34496 2021-07-14 15:54 +00:00 Windows GDI Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-34493 2021-07-14 15:54 +00:00 Windows Partition Management Driver Elevation of Privilege Vulnerability
6.7
MEDIUM
CVE-2021-34492 2021-07-14 15:54 +00:00 Windows Certificate Spoofing Vulnerability
8.1
HIGH
CVE-2021-34491 2021-07-14 15:54 +00:00 Win32k Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-34490 2021-07-14 15:54 +00:00 Windows TCP/IP Driver Denial of Service Vulnerability
7.5
HIGH
CVE-2021-34489 2021-07-14 15:54 +00:00 DirectWrite Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-34488 2021-07-14 15:54 +00:00 Windows Console Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-34476 2021-07-14 15:54 +00:00 Bowser.sys Denial of Service Vulnerability
7.5
HIGH
CVE-2021-33788 2021-07-14 15:53 +00:00 Windows LSA Denial of Service Vulnerability
7.5
HIGH
CVE-2021-33785 2021-07-14 15:53 +00:00 Windows AF_UNIX Socket Provider Denial of Service Vulnerability
7.5
HIGH
CVE-2021-33784 2021-07-14 15:53 +00:00 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-33783 2021-07-14 15:53 +00:00 Windows SMB Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-33782 2021-07-14 15:53 +00:00 Windows Authenticode Spoofing Vulnerability
5.5
MEDIUM
CVE-2021-33781 2021-07-14 15:53 +00:00 Azure AD Security Feature Bypass Vulnerability
8.1
HIGH
CVE-2021-33774 2021-07-14 15:53 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-33773 2021-07-14 15:53 +00:00 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-33772 2021-07-14 15:53 +00:00 Windows TCP/IP Driver Denial of Service Vulnerability
7.5
HIGH
CVE-2021-33765 2021-07-14 15:53 +00:00 Windows Installer Spoofing Vulnerability
6.2
MEDIUM
CVE-2021-33763 2021-07-14 15:53 +00:00 Windows Remote Access Connection Manager Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-33761 2021-07-14 15:53 +00:00 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-33760 2021-07-14 15:53 +00:00 Media Foundation Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-33759 2021-07-14 15:53 +00:00 Windows Desktop Bridge Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-33757 2021-07-14 15:53 +00:00 Windows Security Account Manager Remote Protocol Security Feature Bypass Vulnerability
9.8
CRITICAL
CVE-2021-33756 2021-07-14 15:53 +00:00 Windows DNS Snap-in Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-33755 2021-07-14 15:53 +00:00 Windows Hyper-V Denial of Service Vulnerability
8.6
HIGH
CVE-2021-33752 2021-07-14 15:53 +00:00 Windows DNS Snap-in Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-33751 2021-07-14 15:53 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-33750 2021-07-14 15:53 +00:00 Windows DNS Snap-in Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-33749 2021-07-14 15:53 +00:00 Windows DNS Snap-in Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-33744 2021-07-14 15:53 +00:00 Windows Secure Kernel Mode Security Feature Bypass Vulnerability
6.7
MEDIUM
CVE-2021-33743 2021-07-14 15:53 +00:00 Windows Projected File System Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-33740 2021-07-14 15:53 +00:00 Windows Media Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-31961 2021-07-14 15:53 +00:00 Windows InstallService Elevation of Privilege Vulnerability
6.1
MEDIUM
CVE-2021-31183 2021-07-14 15:53 +00:00 Windows TCP/IP Driver Denial of Service Vulnerability
7.5
HIGH
CVE-2021-31976 2021-06-08 20:46 +00:00 Server for NFS Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-31977 2021-06-08 20:46 +00:00 Windows Hyper-V Denial of Service Vulnerability
8.6
HIGH
CVE-2021-31975 2021-06-08 20:46 +00:00 Server for NFS Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-31973 2021-06-08 20:46 +00:00 Windows GPSVC Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31974 2021-06-08 20:46 +00:00 Server for NFS Denial of Service Vulnerability
7.5
HIGH
CVE-2021-31972 2021-06-08 20:46 +00:00 Event Tracing for Windows Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-31971 2021-06-08 20:46 +00:00 Windows HTML Platforms Security Feature Bypass Vulnerability
8.8
HIGH
CVE-2021-31969 2021-06-08 20:46 +00:00 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31970 2021-06-08 20:46 +00:00 Windows TCP/IP Driver Security Feature Bypass Vulnerability
5.5
MEDIUM
CVE-2021-31968 2021-06-08 20:46 +00:00 Windows Remote Desktop Services Denial of Service Vulnerability
7.5
HIGH
CVE-2021-31962 2021-06-08 20:46 +00:00 Kerberos AppContainer Security Feature Bypass Vulnerability
9.8
CRITICAL
CVE-2021-31960 2021-06-08 20:46 +00:00 Windows Bind Filter Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-31958 2021-06-08 20:46 +00:00 Windows NTLM Elevation of Privilege Vulnerability
8.8
HIGH
CVE-2021-31959 2021-06-08 20:46 +00:00 Scripting Engine Memory Corruption Vulnerability
7.8
HIGH
CVE-2021-31954 2021-06-08 20:46 +00:00 Windows Common Log File System Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31952 2021-06-08 20:46 +00:00 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31951 2021-06-08 20:46 +00:00 Windows Kernel Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26414 2021-06-08 20:46 +00:00 Windows DCOM Server Security Feature Bypass
6.5
MEDIUM
CVE-2021-31208 2021-05-11 17:11 +00:00 Windows Container Manager Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31205 2021-05-11 17:11 +00:00 Windows SMB Client Security Feature Bypass Vulnerability
6.5
MEDIUM
CVE-2021-31194 2021-05-11 17:11 +00:00 OLE Automation Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-31192 2021-05-11 17:11 +00:00 Windows Media Foundation Core Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-31193 2021-05-11 17:11 +00:00 Windows SSDP Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31191 2021-05-11 17:11 +00:00 Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-31188 2021-05-11 17:11 +00:00 Windows Graphics Component Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31187 2021-05-11 17:11 +00:00 Windows WalletService Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31185 2021-05-11 17:11 +00:00 Windows Desktop Bridge Denial of Service Vulnerability
5.5
MEDIUM
CVE-2021-31186 2021-05-11 17:11 +00:00 Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
7.4
HIGH
CVE-2021-31184 2021-05-11 17:11 +00:00 Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-31182 2021-05-11 17:11 +00:00 Microsoft Bluetooth Driver Spoofing Vulnerability
7.1
HIGH
CVE-2021-31169 2021-05-11 17:11 +00:00 Windows Container Manager Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31170 2021-05-11 17:11 +00:00 Windows Graphics Component Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31168 2021-05-11 17:11 +00:00 Windows Container Manager Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31167 2021-05-11 17:11 +00:00 Windows Container Manager Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-31165 2021-05-11 17:11 +00:00 Windows Container Manager Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28479 2021-05-11 17:11 +00:00 Windows CSC Service Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-28476 2021-05-11 17:11 +00:00 Windows Hyper-V Remote Code Execution Vulnerability
9.9
CRITICAL
CVE-2021-28455 2021-05-11 17:11 +00:00 Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-26419 2021-05-11 17:11 +00:00 Scripting Engine Memory Corruption Vulnerability
7.5
HIGH
CVE-2020-24588 2021-05-10 22:00 +00:00 The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
3.5
LOW
CVE-2021-28447 2021-04-13 17:33 +00:00 Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability
4.4
MEDIUM
CVE-2021-28446 2021-04-13 17:33 +00:00 Windows Portmapping Information Disclosure Vulnerability
7.1
HIGH
CVE-2021-28444 2021-04-13 17:33 +00:00 Windows Hyper-V Security Feature Bypass Vulnerability
6.5
MEDIUM
CVE-2021-28445 2021-04-13 17:33 +00:00 Windows Network File System Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28443 2021-04-13 17:33 +00:00 Windows Console Driver Denial of Service Vulnerability
5.5
MEDIUM
CVE-2021-28441 2021-04-13 17:33 +00:00 Windows Hyper-V Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-28442 2021-04-13 17:33 +00:00 Windows TCP/IP Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-28440 2021-04-13 17:33 +00:00 Windows Installer Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28438 2021-04-13 17:33 +00:00 Windows Console Driver Denial of Service Vulnerability
5.5
MEDIUM
CVE-2021-28439 2021-04-13 17:33 +00:00 Windows TCP/IP Driver Denial of Service Vulnerability
7.5
HIGH
CVE-2021-28437 2021-04-13 17:33 +00:00 Windows Installer Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-28435 2021-04-13 17:33 +00:00 Windows Event Tracing Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-28436 2021-04-13 17:33 +00:00 Windows Speech Runtime Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28434 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28357 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28358 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28356 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28354 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28355 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28353 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28351 2021-04-13 17:33 +00:00 Windows Speech Runtime Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28352 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28350 2021-04-13 17:33 +00:00 Windows GDI+ Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-28349 2021-04-13 17:33 +00:00 Windows GDI+ Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-28347 2021-04-13 17:33 +00:00 Windows Speech Runtime Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28348 2021-04-13 17:33 +00:00 Windows GDI+ Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-28346 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28344 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28345 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28343 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28341 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28342 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28340 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28338 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28339 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28337 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28336 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28334 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28335 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28333 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28332 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28330 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28331 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28329 2021-04-13 17:33 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28328 2021-04-13 17:33 +00:00 Windows DNS Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-28326 2021-04-13 17:32 +00:00 Windows AppX Deployment Server Denial of Service Vulnerability
6.1
MEDIUM
CVE-2021-28327 2021-04-13 17:32 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-28325 2021-04-13 17:32 +00:00 Windows SMB Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-28324 2021-04-13 17:32 +00:00 Windows SMB Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-28322 2021-04-13 17:32 +00:00 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28323 2021-04-13 17:32 +00:00 Windows DNS Information Disclosure Vulnerability
6.5
MEDIUM
CVE-2021-28321 2021-04-13 17:32 +00:00 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28319 2021-04-13 17:32 +00:00 Windows TCP/IP Driver Denial of Service Vulnerability
7.5
HIGH
CVE-2021-28320 2021-04-13 17:32 +00:00 Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28318 2021-04-13 17:32 +00:00 Windows GDI+ Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-28317 2021-04-13 17:32 +00:00 Microsoft Windows Codecs Library Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-28315 2021-04-13 17:32 +00:00 Windows Media Video Decoder Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-28316 2021-04-13 17:32 +00:00 Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability
4.6
MEDIUM
CVE-2021-28314 2021-04-13 17:32 +00:00 Windows Hyper-V Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28312 2021-04-13 17:32 +00:00 Windows NTFS Denial of Service Vulnerability
6.5
MEDIUM
CVE-2021-28313 2021-04-13 17:32 +00:00 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28311 2021-04-13 17:32 +00:00 Windows Application Compatibility Cache Denial of Service Vulnerability
6.5
MEDIUM
CVE-2021-27096 2021-04-13 17:32 +00:00 NTFS Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-28309 2021-04-13 17:32 +00:00 Windows Kernel Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-27095 2021-04-13 17:32 +00:00 Windows Media Video Decoder Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-27094 2021-04-13 17:32 +00:00 Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability
4.4
MEDIUM
CVE-2021-27093 2021-04-13 17:32 +00:00 Windows Kernel Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-27092 2021-04-13 17:32 +00:00 Azure AD Web Sign-in Security Feature Bypass Vulnerability
9.8
CRITICAL
CVE-2021-27090 2021-04-13 17:32 +00:00 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-27088 2021-04-13 17:32 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-27089 2021-04-13 17:32 +00:00 Microsoft Internet Messaging API Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-27086 2021-04-13 17:32 +00:00 Windows Services and Controller App Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-27079 2021-04-13 17:32 +00:00 Windows Media Photo Codec Information Disclosure Vulnerability
5.7
MEDIUM
CVE-2021-27072 2021-04-13 17:32 +00:00 Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26417 2021-04-13 17:32 +00:00 Windows Overlay Filter Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-26415 2021-04-13 17:32 +00:00 Windows Installer Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26416 2021-04-13 17:32 +00:00 Windows Hyper-V Denial of Service Vulnerability
7.7
HIGH
CVE-2021-26413 2021-04-13 17:32 +00:00 Windows Installer Spoofing Vulnerability
6.2
MEDIUM
CVE-2021-27077 2021-03-11 14:50 +00:00 Windows Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-27070 2021-03-11 14:49 +00:00 Windows 10 Update Assistant Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26900 2021-03-11 14:44 +00:00 Windows Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26892 2021-03-11 14:42 +00:00 Windows Extensible Firmware Interface Security Feature Bypass Vulnerability
6.2
MEDIUM
CVE-2021-26891 2021-03-11 14:42 +00:00 Windows Container Execution Agent Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26890 2021-03-11 14:42 +00:00 Application Virtualization Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-26889 2021-03-11 14:42 +00:00 Windows Update Stack Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26887 2021-03-11 14:42 +00:00

An elevation of privilege vulnerability exists in Microsoft Windows when Folder redirection has been enabled via Group Policy. When folder redirection file server is co-located with Terminal server, an attacker who successfully exploited the vulnerability would be able to begin redirecting another user's personal data to a created folder.

To exploit the vulnerability, an attacker can create a new folder under the Folder Redirection root path and create a junction on a newly created User folder. When the new user logs in, Folder Redirection would start redirecting to the folder and copying personal data.

This elevation of privilege vulnerability can only be addressed by reconfiguring Folder Redirection with Offline files and restricting permissions, and NOT via a security update for affected Windows Servers. See the FAQ section of this CVE for configuration guidance.

7.8
HIGH
CVE-2021-26886 2021-03-11 14:42 +00:00 User Profile Service Denial of Service Vulnerability
6.1
MEDIUM
CVE-2021-26885 2021-03-11 14:41 +00:00 Windows WalletService Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26884 2021-03-11 14:41 +00:00 Windows Media Photo Codec Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-26882 2021-03-11 14:41 +00:00 Remote Access API Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26881 2021-03-11 14:41 +00:00 Microsoft Windows Media Foundation Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-26880 2021-03-11 14:41 +00:00 Storage Spaces Controller Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26879 2021-03-11 14:41 +00:00 Windows Network Address Translation (NAT) Denial of Service Vulnerability
7.5
HIGH
CVE-2021-26878 2021-03-11 14:40 +00:00 Windows Print Spooler Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26876 2021-03-11 14:39 +00:00 OpenType Font Parsing Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-26875 2021-03-11 14:39 +00:00 Windows Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26874 2021-03-11 14:39 +00:00 Windows Overlay Filter Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26873 2021-03-11 14:39 +00:00 Windows User Profile Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26871 2021-03-11 14:39 +00:00 Windows WalletService Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26872 2021-03-11 14:39 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26870 2021-03-11 14:39 +00:00 Windows Projected File System Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26869 2021-03-11 14:39 +00:00 Windows ActiveX Installer Service Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-26868 2021-03-11 14:38 +00:00 Windows Graphics Component Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26867 2021-03-11 14:38 +00:00 Windows Hyper-V Remote Code Execution Vulnerability
9.9
CRITICAL
CVE-2021-26866 2021-03-11 14:38 +00:00 Windows Update Service Elevation of Privilege Vulnerability
7.1
HIGH
CVE-2021-26865 2021-03-11 14:38 +00:00 Windows Container Execution Agent Elevation of Privilege Vulnerability
8.8
HIGH
CVE-2021-26864 2021-03-11 14:37 +00:00 Windows Virtual Registry Provider Elevation of Privilege Vulnerability
8.4
HIGH
CVE-2021-26863 2021-03-11 14:37 +00:00 Windows Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26862 2021-03-11 14:37 +00:00 Windows Installer Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-26861 2021-03-11 14:37 +00:00 Windows Graphics Component Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-26860 2021-03-11 14:36 +00:00 Windows App-V Overlay Filter Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-24107 2021-03-11 14:03 +00:00 Windows Event Tracing Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-24095 2021-03-11 14:02 +00:00 DirectX Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-24090 2021-03-11 14:01 +00:00 Windows Error Reporting Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1729 2021-03-11 13:58 +00:00 Windows Update Stack Setup Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1640 2021-03-10 15:27 +00:00 Windows Print Spooler Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-25195 2021-02-25 22:01 +00:00 Windows PKU2U Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-24111 2021-02-25 22:01 +00:00 .NET Framework Denial of Service Vulnerability
7.5
HIGH
CVE-2021-24106 2021-02-25 22:01 +00:00 Windows DirectX Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-24103 2021-02-25 22:01 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-24102 2021-02-25 22:01 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-24098 2021-02-25 22:01 +00:00 Windows Console Driver Denial of Service Vulnerability
5.5
MEDIUM
CVE-2021-24094 2021-02-25 22:01 +00:00 Windows TCP/IP Remote Code Execution Vulnerability
9.8
CRITICAL
CVE-2021-24096 2021-02-25 22:01 +00:00 Windows Kernel Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-24093 2021-02-25 22:01 +00:00 Windows Graphics Component Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-24092 2021-02-25 22:01 +00:00 Microsoft Defender Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-24088 2021-02-25 22:01 +00:00 Windows Local Spooler Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-24091 2021-02-25 22:01 +00:00 Windows Camera Codec Pack Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-24086 2021-02-25 22:01 +00:00 Windows TCP/IP Denial of Service Vulnerability
7.5
HIGH
CVE-2021-24083 2021-02-25 22:01 +00:00 Windows Address Book Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-24084 2021-02-25 22:01 +00:00 Windows Mobile Device Management Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-24082 2021-02-25 22:01 +00:00 Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability
6.5
MEDIUM
CVE-2021-24080 2021-02-25 22:01 +00:00 Windows Trust Verification API Denial of Service Vulnerability
6.5
MEDIUM
CVE-2021-24081 2021-02-25 22:01 +00:00 Microsoft Windows Codecs Library Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-24079 2021-02-25 22:01 +00:00 Windows Backup Engine Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-24077 2021-02-25 22:01 +00:00 Windows Fax Service Remote Code Execution Vulnerability
9.8
CRITICAL
CVE-2021-24076 2021-02-25 22:01 +00:00 Microsoft Windows VMSwitch Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-24074 2021-02-25 22:01 +00:00 Windows TCP/IP Remote Code Execution Vulnerability
9.8
CRITICAL
CVE-2021-24075 2021-02-25 22:01 +00:00 Microsoft Windows VMSwitch Denial of Service Vulnerability
6.8
MEDIUM
CVE-2021-1734 2021-02-25 22:01 +00:00 Windows Remote Procedure Call Information Disclosure Vulnerability
7.5
HIGH
CVE-2021-1731 2021-02-25 22:01 +00:00 PFX Encryption Security Feature Bypass Vulnerability
5.5
MEDIUM
CVE-2021-1726 2021-02-25 22:01 +00:00 Microsoft SharePoint Server Spoofing Vulnerability
8
HIGH
CVE-2021-1727 2021-02-25 22:01 +00:00 Windows Installer Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1722 2021-02-25 22:01 +00:00 Windows Fax Service Remote Code Execution Vulnerability
9.8
CRITICAL
CVE-2021-1698 2021-02-25 22:01 +00:00 Windows Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17162 2021-02-25 22:01 +00:00 Microsoft Windows Security Feature Bypass Vulnerability
8.8
HIGH
CVE-2021-1710 2021-01-12 18:42 +00:00 Microsoft Windows Media Foundation Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-1708 2021-01-12 18:42 +00:00 Windows GDI+ Information Disclosure Vulnerability
5.7
MEDIUM
CVE-2021-1709 2021-01-12 18:42 +00:00 Windows Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1706 2021-01-12 18:42 +00:00 Windows LUAFV Elevation of Privilege Vulnerability
8.8
HIGH
CVE-2021-1705 2021-01-12 18:42 +00:00 Microsoft Edge (HTML-based) Memory Corruption Vulnerability
7.5
HIGH
CVE-2021-1703 2021-01-12 18:42 +00:00 Windows Event Logging Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1704 2021-01-12 18:42 +00:00 Windows Hyper-V Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1702 2021-01-12 18:42 +00:00 Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1700 2021-01-12 18:42 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-1701 2021-01-12 18:42 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-1699 2021-01-12 18:42 +00:00 Windows (modem.sys) Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-1696 2021-01-12 18:42 +00:00 Windows Graphics Component Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-1697 2021-01-12 18:42 +00:00 Windows InstallService Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1694 2021-01-12 18:42 +00:00 Windows Update Stack Elevation of Privilege Vulnerability
9.8
CRITICAL
CVE-2021-1695 2021-01-12 18:42 +00:00 Windows Print Spooler Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1693 2021-01-12 18:42 +00:00 Windows CSC Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1691 2021-01-12 18:42 +00:00 Windows Hyper-V Denial of Service Vulnerability
7.7
HIGH
CVE-2021-1690 2021-01-12 18:42 +00:00 Windows WalletService Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1688 2021-01-12 18:42 +00:00 Windows CSC Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1689 2021-01-12 18:42 +00:00 Windows Multipoint Management Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1687 2021-01-12 18:42 +00:00 Windows WalletService Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1685 2021-01-12 18:42 +00:00 Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1686 2021-01-12 18:42 +00:00 Windows WalletService Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1684 2021-01-12 18:42 +00:00 Windows Bluetooth Security Feature Bypass Vulnerability
5.5
MEDIUM
CVE-2021-1682 2021-01-12 18:42 +00:00 Windows Kernel Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1683 2021-01-12 18:42 +00:00 Windows Bluetooth Security Feature Bypass Vulnerability
5.5
MEDIUM
CVE-2021-1681 2021-01-12 18:42 +00:00 Windows WalletService Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1679 2021-01-12 18:42 +00:00 Windows CryptoAPI Denial of Service Vulnerability
6.5
MEDIUM
CVE-2021-1680 2021-01-12 18:42 +00:00 Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1678 2021-01-12 18:42 +00:00 Windows Print Spooler Spoofing Vulnerability
8.8
HIGH
CVE-2021-1676 2021-01-12 18:42 +00:00 Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-1673 2021-01-12 18:42 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-1674 2021-01-12 18:42 +00:00 Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability
8.8
HIGH
CVE-2021-1672 2021-01-12 18:42 +00:00 Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-1670 2021-01-12 18:42 +00:00 Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-1671 2021-01-12 18:42 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-1669 2021-01-12 18:42 +00:00 Windows Remote Desktop Security Feature Bypass Vulnerability
8.8
HIGH
CVE-2021-1668 2021-01-12 18:42 +00:00 Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-1666 2021-01-12 18:42 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-1667 2021-01-12 18:42 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-1664 2021-01-12 18:42 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-1665 2021-01-12 18:42 +00:00 GDI+ Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-1663 2021-01-12 18:42 +00:00 Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-1662 2021-01-12 18:42 +00:00 Windows Event Tracing Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1660 2021-01-12 18:42 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-1661 2021-01-12 18:42 +00:00 Windows Installer Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1658 2021-01-12 18:42 +00:00 Remote Procedure Call Runtime Remote Code Execution Vulnerability
8.8
HIGH
CVE-2021-1659 2021-01-12 18:42 +00:00 Windows CSC Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1657 2021-01-12 18:42 +00:00 Windows Fax Compose Form Remote Code Execution Vulnerability
7.8
HIGH
CVE-2021-1655 2021-01-12 18:42 +00:00 Windows CSC Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1656 2021-01-12 18:42 +00:00 TPM Device Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-1654 2021-01-12 18:42 +00:00 Windows CSC Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1652 2021-01-12 18:42 +00:00 Windows CSC Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1653 2021-01-12 18:42 +00:00 Windows CSC Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1651 2021-01-12 18:42 +00:00 Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1649 2021-01-12 18:42 +00:00 Active Template Library Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1650 2021-01-12 18:42 +00:00 Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1648 2021-01-12 18:42 +00:00 Microsoft splwow64 Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1646 2021-01-12 18:42 +00:00 Windows WLAN Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1645 2021-01-12 18:41 +00:00 Windows Docker Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2021-1642 2021-01-12 18:41 +00:00 Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2021-1638 2021-01-12 18:41 +00:00 Windows Bluetooth Security Feature Bypass Vulnerability
7.7
HIGH
CVE-2021-1637 2021-01-12 18:41 +00:00 Windows DNS Query Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17140 2020-12-09 22:36 +00:00 Windows SMB Information Disclosure Vulnerability
8.1
HIGH
CVE-2020-17139 2020-12-09 22:36 +00:00 Windows Overlay Filter Security Feature Bypass Vulnerability
7.8
HIGH
CVE-2020-17136 2020-12-09 22:36 +00:00 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17137 2020-12-09 22:36 +00:00 DirectX Graphics Kernel Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17134 2020-12-09 22:36 +00:00 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17131 2020-12-09 22:36 +00:00 Chakra Scripting Engine Memory Corruption Vulnerability
7.5
HIGH
CVE-2020-17103 2020-12-09 22:36 +00:00 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17096 2020-12-09 22:36 +00:00 Windows NTFS Remote Code Execution Vulnerability
8.8
HIGH
CVE-2020-17097 2020-12-09 22:36 +00:00 Windows Digital Media Receiver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17098 2020-12-09 22:36 +00:00 Windows GDI+ Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17094 2020-12-09 22:36 +00:00 Windows Error Reporting Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17095 2020-12-09 22:36 +00:00 Windows Hyper-V Remote Code Execution Vulnerability
9.9
CRITICAL
CVE-2020-17092 2020-12-09 22:36 +00:00 Windows Network Connections Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-16964 2020-12-09 22:36 +00:00 Windows Backup Engine Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-16961 2020-12-09 22:36 +00:00 Windows Backup Engine Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-16962 2020-12-09 22:36 +00:00 Windows Backup Engine Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-16963 2020-12-09 22:36 +00:00 Windows Backup Engine Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-16959 2020-12-09 22:36 +00:00 Windows Backup Engine Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-16960 2020-12-09 22:36 +00:00 Windows Backup Engine Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-16958 2020-12-09 22:36 +00:00 Windows Backup Engine Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-1599 2020-11-11 05:48 +00:00 Windows Spoofing Vulnerability
5.5
MEDIUM
CVE-2020-17113 2020-11-11 05:48 +00:00 Windows Camera Codec Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17088 2020-11-11 05:48 +00:00 Windows Common Log File System Driver Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17090 2020-11-11 05:48 +00:00 Microsoft Defender for Endpoint Security Feature Bypass Vulnerability
9.8
CRITICAL
CVE-2020-17087 2020-11-11 05:48 +00:00 Windows Kernel Local Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17076 2020-11-11 05:48 +00:00 Windows Update Orchestrator Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17077 2020-11-11 05:48 +00:00 Windows Update Stack Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17074 2020-11-11 05:48 +00:00 Windows Update Orchestrator Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17075 2020-11-11 05:48 +00:00 Windows USO Core Worker Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17071 2020-11-11 05:48 +00:00 Windows Delivery Optimization Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17073 2020-11-11 05:48 +00:00 Windows Update Orchestrator Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17069 2020-11-11 05:48 +00:00 Windows NDIS Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17070 2020-11-11 05:48 +00:00 Windows Update Medic Service Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17068 2020-11-11 05:48 +00:00 Windows GDI+ Remote Code Execution Vulnerability
7.8
HIGH
CVE-2020-17057 2020-11-11 05:48 +00:00 Windows Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17058 2020-11-11 05:48 +00:00 Microsoft Browser Memory Corruption Vulnerability
7.5
HIGH
CVE-2020-17055 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17056 2020-11-11 05:48 +00:00 Windows Network File System Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17053 2020-11-11 05:48 +00:00 Internet Explorer Memory Corruption Vulnerability
7.5
HIGH
CVE-2020-17054 2020-11-11 05:48 +00:00 Chakra Scripting Engine Memory Corruption Vulnerability
7.5
HIGH
CVE-2020-17052 2020-11-11 05:48 +00:00 Scripting Engine Memory Corruption Vulnerability
8.1
HIGH
CVE-2020-17047 2020-11-11 05:48 +00:00 Windows Network File System Denial of Service Vulnerability
7.5
HIGH
CVE-2020-17048 2020-11-11 05:48 +00:00 Chakra Scripting Engine Memory Corruption Vulnerability
8.1
HIGH
CVE-2020-17045 2020-11-11 05:48 +00:00 Windows KernelStream Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17046 2020-11-11 05:48 +00:00 Windows Error Reporting Denial of Service Vulnerability
5.5
MEDIUM
CVE-2020-17042 2020-11-11 05:48 +00:00 Windows Print Spooler Remote Code Execution Vulnerability
8.8
HIGH
CVE-2020-17043 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17044 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17040 2020-11-11 05:48 +00:00 Windows Hyper-V Security Feature Bypass Vulnerability
9.8
CRITICAL
CVE-2020-17041 2020-11-11 05:48 +00:00 Windows Print Configuration Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17037 2020-11-11 05:48 +00:00 Windows WalletService Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17038 2020-11-11 05:48 +00:00 Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17035 2020-11-11 05:48 +00:00 Windows Kernel Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17036 2020-11-11 05:48 +00:00 Windows Function Discovery SSDP Provider Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17033 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17034 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17031 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17032 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17028 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17029 2020-11-11 05:48 +00:00 Windows Canonical Display Driver Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17030 2020-11-11 05:48 +00:00 Windows MSCTF Server Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17026 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17027 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17024 2020-11-11 05:48 +00:00 Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17025 2020-11-11 05:48 +00:00 Windows Remote Access Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17013 2020-11-11 05:48 +00:00 Win32k Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17014 2020-11-11 05:48 +00:00 Windows Print Spooler Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17011 2020-11-11 05:48 +00:00 Windows Port Class Library Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17007 2020-11-11 05:48 +00:00 Windows Error Reporting Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17010 2020-11-11 05:48 +00:00 Win32k Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17000 2020-11-11 05:47 +00:00 Remote Desktop Protocol Client Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-17001 2020-11-11 05:47 +00:00 Windows Print Spooler Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-17004 2020-11-11 05:47 +00:00 Windows Graphics Component Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-16998 2020-11-11 05:47 +00:00 DirectX Elevation of Privilege Vulnerability
7.8
HIGH
CVE-2020-16999 2020-11-11 05:47 +00:00 Windows WalletService Information Disclosure Vulnerability
5.5
MEDIUM
CVE-2020-16997 2020-11-11 05:47 +00:00 Remote Desktop Protocol Server Information Disclosure Vulnerability
7.7
HIGH
CVE-2020-1167 2020-10-16 20:18 +00:00

A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.

To exploit the vulnerability, a user would have to open a specially crafted file.

The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.

7.8
HIGH
CVE-2020-1243 2020-10-16 20:18 +00:00

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.

To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.

The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.

7.8
HIGH
CVE-2020-1047 2020-10-16 20:18 +00:00

An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system.

This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running.

The update addresses the vulnerabilities by correcting how Windows Hyper-V handles objects in memory.

7.8
HIGH
CVE-2020-1080 2020-10-16 20:18 +00:00

An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system.

This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running.

The update addresses the vulnerabilities by correcting how Windows Hyper-V handles objects in memory.

8.8
HIGH
CVE-2020-17022 2020-10-16 20:18 +00:00

A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code.

Exploitation of the vulnerability requires that a program process a specially crafted image file.

The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.

7.8
HIGH
CVE-2020-16975 2020-10-16 20:18 +00:00

An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.

7.8
HIGH
CVE-2020-16976 2020-10-16 20:18 +00:00

An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.

7.8
HIGH
CVE-2020-16973 2020-10-16 20:18 +00:00

An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.

7.8
HIGH
CVE-2020-16974 2020-10-16 20:18 +00:00

An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.

7.8
HIGH
CVE-2020-16972 2020-10-16 20:18 +00:00

An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.

7.8
HIGH
CVE-2020-16967 2020-10-16 20:18 +00:00

A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of the Windows Camera Codec Pack. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.

The security update addresses the vulnerability by correcting how the Windows Camera Codec Pack handles objects in memory.

7.8
HIGH
CVE-2020-16968 2020-10-16 20:18 +00:00

A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of the Windows Camera Codec Pack. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.

The security update addresses the vulnerability by correcting how the Windows Camera Codec Pack handles objects in memory.

7.8
HIGH
CVE-2020-16949 2020-10-16 20:18 +00:00

A denial of service vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could cause a remote denial of service against a system.

Exploitation of the vulnerability requires that a specially crafted email be sent to a vulnerable Outlook server.

The security update addresses the vulnerability by correcting how Microsoft Outlook handles objects in memory.

7.5
HIGH
CVE-2020-16938 2020-10-16 20:17 +00:00

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.

The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.

5.5
MEDIUM
CVE-2020-16939 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when Group Policy improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.

The security update addresses the vulnerability by correcting how Group Policy checks access.

7.8
HIGH
CVE-2020-16940 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles junction points. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete files or folders of their choosing.

The security update addresses the vulnerability by correcting how the Windows User Profile Service handles junction points.

7.8
HIGH
CVE-2020-16937 2020-10-16 20:17 +00:00

An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.

To exploit the vulnerability, an authenticated attacker would need to run a specially crafted application.

The update addresses the vulnerability by correcting how the .NET Framework handles objects in memory.

5.5
MEDIUM
CVE-2020-16935 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when Windows improperly handles COM object creation. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The update addresses the vulnerability by correcting how the Windows COM Server creates COM objects.

7.8
HIGH
CVE-2020-16936 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.

7.8
HIGH
CVE-2020-16933 2020-10-16 20:17 +00:00

A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user.

To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.

The security update addresses the vulnerability by correcting how Microsoft Word handles these files.

8.8
HIGH
CVE-2020-16924 2020-10-16 20:17 +00:00

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.

The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.

7.8
HIGH
CVE-2020-16927 2020-10-16 20:17 +00:00

A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding.

To exploit this vulnerability, an attacker would need to run a specially crafted application against a server which provides Remote Desktop Protocol (RDP) services.

The update addresses the vulnerability by correcting how RDP handles connection requests.

7.5
HIGH
CVE-2020-16922 2020-10-16 20:17 +00:00

A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files.

In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded.

The update addresses the vulnerability by correcting how Windows validates file signatures.

5.5
MEDIUM
CVE-2020-16923 2020-10-16 20:17 +00:00

A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.

To exploit the vulnerability, a user would have to open a specially crafted file.

The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.

7.8
HIGH
CVE-2020-16919 2020-10-16 20:17 +00:00

An information disclosure vulnerability exists when the Windows Enterprise App Management Service improperly handles certain file operations. An attacker who successfully exploited this vulnerability could read arbitrary files.

An attacker with unprivileged access to a vulnerable system could exploit this vulnerability.

The security update addresses the vulnerability by ensuring the Windows Enterprise App Management Service properly handles file operations.

5.5
MEDIUM
CVE-2020-16920 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.

To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows Application Compatibility Client Library properly handles registry operations.

7.8
HIGH
CVE-2020-16921 2020-10-16 20:17 +00:00

An information disclosure vulnerability exists in Text Services Framework when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.

To exploit this vulnerability, an attacker would have to log on to an affected system and open a specially crafted file.

The update addresses the vulnerability by correcting how Text Services Framework handles objects in memory.

5.5
MEDIUM
CVE-2020-16916 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when Windows improperly handles COM object creation. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The update addresses the vulnerability by correcting how the Windows COM Server creates COM objects.

7.8
HIGH
CVE-2020-16914 2020-10-16 20:17 +00:00

An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface Plus (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.

The security update addresses the vulnerability by correcting how GDI+ handles memory addresses.

5.5
MEDIUM
CVE-2020-16915 2020-10-16 20:17 +00:00

A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.

There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage.

The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.

8.8
HIGH
CVE-2020-16912 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.

7.8
HIGH
CVE-2020-16913 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.

7.8
HIGH
CVE-2020-16910 2020-10-16 20:17 +00:00

A security feature bypass vulnerability exists when Microsoft Windows fails to handle file creation permissions, which could allow an attacker to create files in a protected Unified Extensible Firmware Interface (UEFI) location.

To exploit this vulnerability, an attacker could run a specially crafted application to bypass Unified Extensible Firmware Interface (UEFI) variable security in Windows.

The security update addresses the vulnerability by correcting security feature behavior to enforce permissions.

6.2
MEDIUM
CVE-2020-16911 2020-10-16 20:17 +00:00

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

There are multiple ways an attacker could exploit the vulnerability:

  • In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message.
  • In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file.

The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.

8.8
HIGH
CVE-2020-16908 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists in Windows Setup in the way it handles directories.

A locally authenticated attacker could run arbitrary code with elevated system privileges. After successfully exploiting the vulnerability, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The security update addresses the vulnerability by ensuring Windows Setup properly handles directories.

7.8
HIGH
CVE-2020-16909 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it.

An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functionality. To exploit the vulnerability, an attacker could run a specially crafted application.

The security update addresses the vulnerability by correcting the way that WER handles and executes files.

7.8
HIGH
CVE-2020-16905 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it.

An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functionality. To exploit the vulnerability, an attacker could run a specially crafted application.

The security update addresses the vulnerability by correcting the way that WER handles and executes files.

7.8
HIGH
CVE-2020-16907 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.

7.8
HIGH
CVE-2020-16902 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.

A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The security update addresses the vulnerability by correcting the input sanitization error to preclude unintended elevation.

7.8
HIGH
CVE-2020-16899 2020-10-16 20:17 +00:00

A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could cause a target system to stop responding.

To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The vulnerability would not allow an attacker to execute code or to elevate user rights directly.

The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.

7.5
HIGH
CVE-2020-16900 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when the Windows Event System improperly handles objects in memory.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows Event System handles objects in memory.

7.8
HIGH
CVE-2020-16897 2020-10-16 20:17 +00:00

An information disclosure vulnerability exists when NetBIOS over TCP (NBT) Extensions (NetBT) improperly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

To exploit this vulnerability, an attacker would have run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.

The update addresses the vulnerability by correcting how a NetBT handles objects in memory.

5.5
MEDIUM
CVE-2020-16898 2020-10-16 20:17 +00:00

A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client.

To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer.

The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.

8.8
HIGH
CVE-2020-16895 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash. An attacker who successfully exploited this vulnerability could delete a targeted file leading to an elevated status.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The security update addresses the vulnerability by correcting how Windows Error Reporting manager handles process crashes.

7.8
HIGH
CVE-2020-16896 2020-10-16 20:17 +00:00

An information disclosure vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

To exploit this vulnerability, an attacker would need to run a specially crafted application against a server which provides Remote Desktop Protocol (RDP) services.

The update addresses the vulnerability by correcting how RDP handles connection requests.

7.5
HIGH
CVE-2020-16892 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory.

7.8
HIGH
CVE-2020-16890 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system.

The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.

7.8
HIGH
CVE-2020-16891 2020-10-16 20:17 +00:00

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.

The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.

8.8
HIGH
CVE-2020-16887 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows Network Connections Service properly handles objects in memory.

7.8
HIGH
CVE-2020-16889 2020-10-16 20:17 +00:00

An information disclosure vulnerability exists when the Windows KernelStream improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.

The update addresses the vulnerability by correcting how the Windows KernelStream handles objects in memory.

5.5
MEDIUM
CVE-2020-16885 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when the Windows Storage VSP Driver improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.

To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows Storage VSP Driver properly handles file operations.

7.8
HIGH
CVE-2020-16876 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.

To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows Application Compatibility Client Library properly handles registry operations.

7.8
HIGH
CVE-2020-16877 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when Microsoft Windows improperly handles reparse points. An attacker who successfully exploited this vulnerability could overwrite or delete a targeted file that would normally require elevated permissions.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and overwrite or delete files.

The security update addresses the vulnerability by correcting how Windows handles reparse points.

7.1
HIGH
CVE-2020-0764 2020-10-16 20:17 +00:00

An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.

To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows Storage Services properly handle file operations.

7.8
HIGH
CVE-2020-1598 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.

The update addresses the vulnerability by correcting how the Windows UPnP service handles objects in memory.

7.8
HIGH
CVE-2020-1596 2020-09-11 15:09 +00:00

A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise a users's encrypted transmission channel.

To exploit the vulnerability, an attacker would have to conduct a man-in-the-middle attack.

The update addresses the vulnerability by correcting how TLS components use hash algorithms.

5.4
MEDIUM
CVE-2020-1593 2020-09-11 15:09 +00:00

A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system.

There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage.

The security update addresses the vulnerability by correcting how Windows Media Audio Decoder handles objects.

8.8
HIGH
CVE-2020-1590 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when the Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system.

To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application.

The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service handles file operations.

7.8
HIGH
CVE-2020-1592 2020-09-11 15:09 +00:00

An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.

To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.

4.4
MEDIUM
CVE-2020-1589 2020-09-11 15:09 +00:00

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.

The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.

5.5
MEDIUM
CVE-2020-1559 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.

To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows Storage Services properly handle file operations.

7.8
HIGH
CVE-2020-1532 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when the Windows InstallService improperly handles memory.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows InstallService handles memory.

7.8
HIGH
CVE-2020-1508 2020-09-11 15:09 +00:00

A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system.

There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage.

The security update addresses the vulnerability by correcting how Windows Media Audio Decoder handles objects.

8.8
HIGH
CVE-2020-1506 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

There are multiple ways an attacker could exploit the vulnerability:

  • In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email.

  • In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit this vulnerability, and then convince a user to open the document file.

The security update addresses the vulnerability by ensuring the Wininit.dll properly handles objects in memory.

8.8
HIGH
CVE-2020-1507 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system.

To exploit the vulnerability, a user would have to open a specially crafted file.

The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.

7.9
HIGH
CVE-2020-1491 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows Function Discovery Service properly handles objects in memory.

7.8
HIGH
CVE-2020-1471 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when Microsoft Windows CloudExperienceHost fails to check COM objects. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system.

To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.

The security update addresses the vulnerability by checking COM objects.

7.8
HIGH
CVE-2020-1376 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists in the way that fdSSDP.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

The security update addresses the vulnerability by ensuring the ssdpsrv.dll properly handles objects in memory.

7.8
HIGH
CVE-2020-1319 2020-09-11 15:09 +00:00

A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Exploitation of the vulnerability requires that a program process a specially crafted image file.

The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.

7.8
HIGH
CVE-2020-1285 2020-09-11 15:09 +00:00

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

There are multiple ways an attacker could exploit the vulnerability:

  • In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message.
  • In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file.

The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.

8.8
HIGH
CVE-2020-1303 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.

An attacker could exploit this vulnerability by running a specially crafted application on the victim system.

The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.

7.8
HIGH
CVE-2020-1308 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The update addresses the vulnerability by correcting how DirectX handles objects in memory.

7.8
HIGH
CVE-2020-1252 2020-09-11 15:09 +00:00

A remote code execution vulnerability exists when Windows improperly handles objects in memory. To exploit the vulnerability an attacker would have to convince a user to run a specially crafted application.

An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The updates address the vulnerability by correcting how Windows handles objects in memory.

7.8
HIGH
CVE-2020-1256 2020-09-11 15:09 +00:00

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.

The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.

6.5
MEDIUM
CVE-2020-1250 2020-09-11 15:09 +00:00

An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.

The security update addresses the vulnerability by correcting how win32k handles objects in memory.

5.5
MEDIUM
CVE-2020-1245 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The update addresses this vulnerability by correcting how Win32k handles objects in memory.

7.8
HIGH
CVE-2020-1180 2020-09-11 15:09 +00:00

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.

If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.

7.5
HIGH
CVE-2020-1172 2020-09-11 15:09 +00:00

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.

If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.

7.5
HIGH
CVE-2020-1159 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles file creation in protected locations. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

The security update addresses the vulnerability by ensuring the StartTileData.dll properly handles this type of function.

7.8
HIGH
CVE-2020-1169 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.

An attacker could exploit this vulnerability by running a specially crafted application on the victim system.

The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.

7.8
HIGH
CVE-2020-1146 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Microsoft Store Runtime handles memory.

7.8
HIGH
CVE-2020-1152 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system.

To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.

The update addresses the vulnerability by correcting how Windows handles calls to Win32k.

7.8
HIGH
CVE-2020-1130 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles data operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

An attacker could exploit this vulnerability by running a specially crafted application on the victim system.

The update addresses the vulnerability by correcting the way the Diagnostics Hub Standard Collector handles data operations.

7.8
HIGH
CVE-2020-1133 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

An attacker could exploit this vulnerability by running a specially crafted application on the victim system.

The update addresses the vulnerability by correcting the way the Diagnostics Hub Standard Collector handles file operations.

7.8
HIGH
CVE-2020-1122 2020-09-11 15:09 +00:00

An elevation of privilege vulnerability exists when the Windows Language Pack Installer improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

An attacker could exploit this vulnerability by running a specially crafted application on the victim system.

The update addresses the vulnerability by correcting the way the Windows Language Pack Installer handles file operations.

7.8
HIGH
CVE-2020-1129 2020-09-11 15:09 +00:00

A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Exploitation of the vulnerability requires that a program process a specially crafted image file.

The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.

8.8
HIGH
CVE-2020-1115 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.

The security update addresses the vulnerability by correcting how CLFS handles objects in memory.

7.8
HIGH
CVE-2020-1119 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when StartTileData.dll improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.

The update addresses the vulnerability by correcting the way in which StartTileData.dll handles objects in memory.

5.5
MEDIUM
CVE-2020-1097 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.

There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage.

The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.

6.5
MEDIUM
CVE-2020-1098 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when the Shell infrastructure component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The update addresses the vulnerability by correcting the way in which the Shell infrastructure component handles objects in memory and preventing unintended elevation from lower integrity application.

7.8
HIGH
CVE-2020-1083 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.

The update addresses the vulnerability by correcting the way in which the Windows Graphics Component handles objects in memory.

5.5
MEDIUM
CVE-2020-1091 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.

There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage.

The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.

6.5
MEDIUM
CVE-2020-1057 2020-09-11 15:08 +00:00

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.

If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.

8.1
HIGH
CVE-2020-1074 2020-09-11 15:08 +00:00

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.

The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.

7.8
HIGH
CVE-2020-1052 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

The security update addresses the vulnerability by ensuring the ssdpsrv.dll properly handles objects in memory.

7.8
HIGH
CVE-2020-1053 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The update addresses the vulnerability by correcting how DirectX handles objects in memory.

7.8
HIGH
CVE-2020-1039 2020-09-11 15:08 +00:00

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.

An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.

The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.

7.8
HIGH
CVE-2020-1034 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.

7.8
HIGH
CVE-2020-1038 2020-09-11 15:08 +00:00

A denial of service vulnerability exists when Windows Routing Utilities improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding.

The update addresses the vulnerability by correcting how Windows handles objects in memory.

5.5
MEDIUM
CVE-2020-1031 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists in the way that the Windows Server DHCP service improperly discloses the contents of its memory.

To exploit the vulnerability, an unauthenticated attacker could send a specially crafted packet to an affected DHCP server. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

The security update addresses the vulnerability by correcting how DHCP servers initializes memory.

7.5
HIGH
CVE-2020-1033 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

An authenticated attacker could exploit this vulnerability by running a specially crafted application.

The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.

5.5
MEDIUM
CVE-2020-1013 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine.

To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine. An attacker could then create a group policy to grant administrator rights to a standard user.

The security update addresses the vulnerability by enforcing Kerberos authentication for certain calls over LDAP.

8.1
HIGH
CVE-2020-1030 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.

The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system.

7.8
HIGH
CVE-2020-1012 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

There are multiple ways an attacker could exploit the vulnerability:

  • In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email.

  • In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit this vulnerability, and then convince a user to open the document file.

The security update addresses the vulnerability by ensuring the Wininit.dll properly handles objects in memory.

8.8
HIGH
CVE-2020-16879 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when a Windows Projected Filesystem improperly handles file redirections. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability.

The security update addresses the vulnerability by correcting how Windows Projected Filesystem handle file redirections.

5.5
MEDIUM
CVE-2020-16854 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.

The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.

5.5
MEDIUM
CVE-2020-0997 2020-09-11 15:08 +00:00

A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of the Windows Camera Codec Pack. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.

The security update addresses the vulnerability by correcting how the Windows Camera Codec Pack handles objects in memory.

7.8
HIGH
CVE-2020-0998 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system.

The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.

7.8
HIGH
CVE-2020-0951 2020-09-11 15:08 +00:00

A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC.

To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code.

The update addresses the vulnerability by correcting how PowerShell commands are validated when WDAC protection is enabled.

6.7
MEDIUM
CVE-2020-0989 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions. An attacker who successfully exploited this vulnerability could bypass access restrictions to read files.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and access files.

The security update addresses the vulnerability by correcting the how Windows MDM Diagnostics handles files.

5.5
MEDIUM
CVE-2020-0928 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.

The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.

5.5
MEDIUM
CVE-2020-0941 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.

To exploit the vulnerability, an attacker would have to either log on locally to an affected system, or convince a locally authenticated user to execute a specially crafted application.

The security update addresses the vulnerability by correcting how win32k handles objects in memory.

5.5
MEDIUM
CVE-2020-0921 2020-09-11 15:08 +00:00 Microsoft Graphics Component Denial of Service Vulnerability
5.5
MEDIUM
CVE-2020-0922 2020-09-11 15:08 +00:00

A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.

To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript.

The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.

8.8
HIGH
CVE-2020-0912 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows Function Discovery SSDP Provider handles memory.

7.8
HIGH
CVE-2020-0914 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.

An attacker could exploit this vulnerability by running a specially crafted application on the victim system.

The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.

5.5
MEDIUM
CVE-2020-0908 2020-09-11 15:08 +00:00

A remote code execution vulnerability exists when the Windows Text Service Module improperly handles memory. An attacker who successfully exploited the vulnerability could gain execution on a victim system.

An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge (Chromium-based), and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by way of enticement in an email or Instant Messenger message, or by getting them to open an attachment sent through email.

The security update addresses the vulnerability by correcting how the Windows Text Service Module handles memory.

7.5
HIGH
CVE-2020-0911 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when Windows Modules Installer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.

An attacker could exploit this vulnerability by running a specially crafted application on the victim system.

The update addresses the vulnerability by correcting the way the Windows Modules Installer handles objects in memory.

7.8
HIGH
CVE-2020-0890 2020-09-11 15:08 +00:00

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.

To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.

The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.

6.5
MEDIUM
CVE-2020-0904 2020-09-11 15:08 +00:00

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.

To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.

The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.

6.5
MEDIUM
CVE-2020-0886 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.

To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.

The security update addresses the vulnerability by ensuring the Windows Storage Services properly handle file operations.

7.8
HIGH
CVE-2020-0875 2020-09-11 15:08 +00:00

An information disclosure vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system (low-integrity to medium-integrity).

This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted.

The security update addresses the vulnerability by ensuring splwow64.exe properly handles these calls.

5.5
MEDIUM
CVE-2020-0837 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when Active Directory Federation Services (ADFS) improperly handles multi-factor authentication requests. An attacker who successfully exploited this vulnerability could bypass some, but not all, of the authentication factors.

To exploit this vulnerability, an attacker could send a specially crafted authentication request.

This security update corrects how ADFS handles multi-factor authentication requests.

5.3
MEDIUM
CVE-2020-0838 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when NTFS improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context.

To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.

The security update addresses the vulnerability by correcting how NTFS checks access.

7.8
HIGH
CVE-2020-0839 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.

The security update addresses the vulnerability by ensuring the dnsrslvr.dll properly handles objects in memory.

7.8
HIGH
CVE-2020-0805 2020-09-11 15:08 +00:00

A security feature bypass vulnerability exists when a Windows Projected Filesystem improperly handles file redirections. An attacker who successfully exploited this vulnerability could delete a targeted file they would not have permissions to.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability.

The security update addresses the vulnerability by correcting how Windows Projected Filesystem handle file redirections.

5.5
MEDIUM
CVE-2020-0790 2020-09-11 15:08 +00:00

A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.

This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted.

The security update addresses the vulnerability by ensuring splwow64.exe properly handles these calls..

7.8
HIGH
CVE-2020-0766 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Microsoft Store Runtime handles memory.

7.8
HIGH
CVE-2020-0782 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when the Windows Cryptographic Catalog Services improperly handle objects in memory. An attacker who successfully exploited this vulnerability could modify the cryptographic catalog.

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

The security update addresses the vulnerability by addressing how the Windows Cryptographic Catalog Services handle objects in memory.

7.8
HIGH
CVE-2020-0648 2020-09-11 15:08 +00:00

An elevation of privilege vulnerability exists when the Windows RSoP Service Application improperly handles memory.

To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.

The security update addresses the vulnerability by correcting how the Windows RSoP Service Application handles memory.

7.8
HIGH
CVE-2020-1585 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of the vulnerability requires that a program process a specially crafted image file. The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.
8.8
HIGH
CVE-2020-1587 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Ancillary Function Driver for WinSock improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Ancillary Function Driver for WinSock handles memory.
7.8
HIGH
CVE-2020-1584 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the dnsrslvr.dll properly handles objects in memory.
7.8
HIGH
CVE-2020-1578 2020-08-17 17:13 +00:00 An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object. To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.
4.7
MEDIUM
CVE-2020-1579 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Function Discovery SSDP Provider handles memory.
7.8
HIGH
CVE-2020-1574 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code. Exploitation of the vulnerability requires that a program process a specially crafted image file. The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.
7.3
HIGH
CVE-2020-1577 2020-08-17 17:13 +00:00 An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
7.8
HIGH
CVE-2020-1571 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists in Windows Setup in the way it handles permissions. A locally authenticated attacker could run arbitrary code with elevated system privileges. After successfully exploiting the vulnerability, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by ensuring Windows Setup properly handles permissions.
7.8
HIGH
CVE-2020-1569 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by way of enticement in an email or Instant Messenger message, or by getting them to open an attachment sent through email. The security update addresses the vulnerability by modifying how Microsoft Edge handles objects in memory.
7.8
HIGH
CVE-2020-1570 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
7.5
HIGH
CVE-2020-1567 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input. An attacker could execute arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a HTML editing attack scenario, an attacker could trick a user into editing a specially crafted file that is designed to exploit the vulnerability. The security update addresses the vulnerability by modifying how MSHTML engine validates input.
7.5
HIGH
CVE-2020-1568 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit the vulnerability, in a web-based attack scenario, an attacker could host a website that contains malicious PDF content. In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted PDF content that could exploit the vulnerability. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could trick a user into clicking a link that takes the user to the attacker's site. The security update addresses the vulnerability by modifying how Microsoft Edge PDF Reader handles objects in memory.
7.5
HIGH
CVE-2020-1565 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the "Public Account Pictures" folder improperly handles junctions. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how Windows handles junctions.
7.8
HIGH
CVE-2020-1566 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
7.8
HIGH
CVE-2020-1564 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
7.8
HIGH
CVE-2020-1561 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
8.8
HIGH
CVE-2020-1562 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
7.8
HIGH
CVE-2020-1558 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
7.8
HIGH
CVE-2020-1560 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of the vulnerability requires that a program process a specially crafted image file. The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.
7.8
HIGH
CVE-2020-1556 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows WalletService properly handles objects in memory.
7.8
HIGH
CVE-2020-1557 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
7.8
HIGH
CVE-2020-1553 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
7.8
HIGH
CVE-2020-1554 2020-08-17 17:13 +00:00 A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
7.8
HIGH
CVE-2020-1555 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge (HTML-based). The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge (HTML-based) and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
8.8
HIGH
CVE-2020-1551 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1552 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Work Folder Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Work Folder Service handles file operations.
8
HIGH
CVE-2020-1549 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows CDP User Components improperly handle memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CDP User Components handle memory.
7.8
HIGH
CVE-2020-1550 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows CDP User Components improperly handle memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CDP User Components handle memory.
7.8
HIGH
CVE-2020-1547 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1548 2020-08-17 17:13 +00:00 An information disclosure vulnerability exists when the Windows WaasMedic Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to improperly disclose memory. The security update addresses the vulnerability by correcting how the Windows WaasMedic Service handles memory.
7.8
HIGH
CVE-2020-1545 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1546 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1543 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1544 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1541 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1542 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1539 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1540 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1536 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1537 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Remote Access improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Remote Access properly handles file operations.
7.8
HIGH
CVE-2020-1538 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows UPnP Device Host handles memory.
7.8
HIGH
CVE-2020-1534 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.
7.8
HIGH
CVE-2020-1535 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
7.8
HIGH
CVE-2020-1531 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Accounts Control improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Accounts Control handles memory.
7.8
HIGH
CVE-2020-1533 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows WalletService properly handles objects in memory.
7.8
HIGH
CVE-2020-1529 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how GDI handles objects in memory and by preventing instances of unintended user-mode privilege elevation.
7.8
HIGH
CVE-2020-1530 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when Windows Remote Access improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how Windows Remote Access handles memory.
7.8
HIGH
CVE-2020-1527 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Custom Protocol Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Custom Protocol Engine handles memory.
7.8
HIGH
CVE-2020-1528 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Radio Manager API improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Radio Manager API handles memory.
7.8
HIGH
CVE-2020-1525 2020-08-17 17:13 +00:00 A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
8.8
HIGH
CVE-2020-1526 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Network Connection Broker improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Network Connection Broker handles memory.
7.8
HIGH
CVE-2020-1522 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Speech Runtime improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Speech Runtime handles memory.
7.8
HIGH
CVE-2020-1524 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Speech Shell Components improperly handle memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Speech Shell Components handle memory.
7.8
HIGH
CVE-2020-1520 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory. An attacker who successfully exploited the vulnerability would gain execution on a victim system. The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory.
7.8
HIGH
CVE-2020-1521 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Speech Runtime improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Speech Runtime handles memory.
7.8
HIGH
CVE-2020-1518 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows File Server Resource Management Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows File Server Resource Management Service handles memory.
7.8
HIGH
CVE-2020-1519 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows UPnP Device Host handles memory.
7.8
HIGH
CVE-2020-1516 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Work Folders Service handles memory.
7.8
HIGH
CVE-2020-1517 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows File Server Resource Management Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows File Server Resource Management Service handles memory.
7.8
HIGH
CVE-2020-1513 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CSC Service handles memory.
7.8
HIGH
CVE-2020-1515 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Telephony Server improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Telephony Server handles memory.
7.8
HIGH
CVE-2020-1511 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service handles file operations.
7.8
HIGH
CVE-2020-1512 2020-08-17 17:13 +00:00 An information disclosure vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
7.8
HIGH
CVE-2020-1509 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists in the Local Security Authority Subsystem Service (LSASS) when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause an elevation of privilege on the target system's LSASS service. The security update addresses the vulnerability by changing the way that LSASS handles specially crafted authentication requests.
8.8
HIGH
CVE-2020-1510 2020-08-17 17:13 +00:00 An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
5.5
MEDIUM
CVE-2020-1492 2020-08-17 17:13 +00:00 A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
7.8
HIGH
CVE-2020-1489 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CSC Service handles memory.
7.8
HIGH
CVE-2020-1490 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application. The security update addresses the vulnerability by correcting how the Storage Services handles file operations.
7.8
HIGH
CVE-2020-1487 2020-08-17 17:13 +00:00 An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log onto an affected system and open a specially crafted file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. The update addresses the vulnerability by correcting how Media Foundation handles objects in memory.
7.8
HIGH
CVE-2020-1488 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files. To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges.
7.8
HIGH
CVE-2020-1485 2020-08-17 17:13 +00:00 An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an authenticated attacker could connect an imaging device (camera, scanner, cellular phone) to an affected system and run a specially crafted application to disclose information. The security update addresses the vulnerability by correcting how the WIA Service handles objects in memory.
5.5
MEDIUM
CVE-2020-1486 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
7.8
HIGH
CVE-2020-1484 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Work Folders Service handles memory.
7.8
HIGH
CVE-2020-1479 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
7.8
HIGH
CVE-2020-1480 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how GDI handles objects in memory and by preventing instances of unintended user-mode privilege elevation.
7.8
HIGH
CVE-2020-1477 2020-08-17 17:13 +00:00 A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
7.8
HIGH
CVE-2020-1478 2020-08-17 17:13 +00:00 A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
7.8
HIGH
CVE-2020-1475 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists in the way that the srmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the srmsvc.dll properly handles objects in memory.
7.8
HIGH
CVE-2020-1476 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server. The update addresses the vulnerability by changing how ASP.NET and .NET handle requests.
5.5
MEDIUM
CVE-2020-1473 2020-08-17 17:13 +00:00 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
7.8
HIGH
CVE-2020-1474 2020-08-17 17:13 +00:00 An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an authenticated attacker could connect an imaging device (camera, scanner, cellular phone) to an affected system and run a specially crafted application to disclose information. The security update addresses the vulnerability by correcting how the WIA Service handles objects in memory.
7.8
HIGH
CVE-2020-1467 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows handles hard links.
10
CRITICAL
CVE-2020-1470 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Work Folders Service handles memory.
7.8
HIGH
CVE-2020-1459 2020-08-17 17:13 +00:00 An information disclosure vulnerability exists on ARM implementations that use speculative execution in control flow via a side-channel analysis, aka "straight-line speculation." To exploit this vulnerability, an attacker with local privileges would need to run a specially crafted application. The security update addresses the vulnerability by bypassing the speculative execution.
7.5
HIGH
CVE-2020-1383 2020-08-17 17:13 +00:00 An information disclosure vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system To exploit this vulnerability, an attacker would need to run a specially crafted application against an RPC server which has Routing and Remote Access enabled. Routing and Remote Access is a non-default configuration; systems without it enabled are not vulnerable. The security update addresses the vulnerability by correcting how the Routing and Remote Access service handles requests.
5.5
MEDIUM
CVE-2020-1417 2020-08-17 17:13 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
7.8
HIGH
CVE-2020-1379 2020-08-17 17:13 +00:00 A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
7.8
HIGH
CVE-2020-1377 2020-08-17 17:12 +00:00 An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.
7.8
HIGH
CVE-2020-1378 2020-08-17 17:12 +00:00 An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.
7.8
HIGH
CVE-2020-1337 2020-08-17 17:12 +00:00 An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system.
7.8
HIGH
CVE-2020-1339 2020-08-17 17:12 +00:00 A remote code execution vulnerability exists when Windows Media Audio Codec improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Audio Codec handles objects.
8.8
HIGH
CVE-2020-15705 2020-07-28 22:00 +00:00 GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
6.4
MEDIUM
CVE-2020-15706 2020-07-28 22:00 +00:00 GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.
6.4
MEDIUM
CVE-2020-15707 2020-07-28 22:00 +00:00 Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
6.4
MEDIUM
CVE-2020-1457 2020-07-27 16:50 +00:00 A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1425.
7.8
HIGH
CVE-2020-1425 2020-07-27 16:50 +00:00 A remoted code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1457.
7.8
HIGH
CVE-2020-1463 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the SharedStream Library handles objects in memory, aka 'Windows SharedStream Library Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1468 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'.
6.5
MEDIUM
CVE-2020-1462 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when Skype for Business is accessed via Microsoft Edge (EdgeHTML-based), aka 'Skype for Business via Microsoft Edge (EdgeHTML-based) Information Disclosure Vulnerability'.
4.3
MEDIUM
CVE-2020-1438 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1428.
7.8
HIGH
CVE-2020-1436 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Windows Font Library Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1437 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory, aka 'Windows Network Location Awareness Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1434 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Sync Host Service handles objects in memory, aka 'Windows Sync Host Service Elevation of Privilege Vulnerability'.
5.3
MEDIUM
CVE-2020-1435 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1432 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when Skype for Business is accessed via Internet Explorer, aka 'Skype for Business via Internet Explorer Information Disclosure Vulnerability'.
4.3
MEDIUM
CVE-2020-1433 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory, aka 'Microsoft Edge PDF Information Disclosure Vulnerability'.
6.5
MEDIUM
CVE-2020-1430 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows UPnP Device Host Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1354.
7.8
HIGH
CVE-2020-1431 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1428 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1438.
7.8
HIGH
CVE-2020-1429 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1426 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1367, CVE-2020-1389, CVE-2020-1419.
5.5
MEDIUM
CVE-2020-1427 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1428, CVE-2020-1438.
7.8
HIGH
CVE-2020-1422 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1399, CVE-2020-1404, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415.
7.8
HIGH
CVE-2020-1423 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Subsystem for Linux handles files, aka 'Windows Subsystem for Linux Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1424 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory, aka 'Windows Update Stack Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1420 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when Windows Error Reporting improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Error Reporting Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1421 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1418 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Diagnostics Execution Service fails to properly sanitize input, leading to an unsecure library-loading behavior, aka 'Windows Diagnostics Hub Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1393.
7.8
HIGH
CVE-2020-1419 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1367, CVE-2020-1389, CVE-2020-1426.
5.5
MEDIUM
CVE-2020-1415 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1399, CVE-2020-1404, CVE-2020-1413, CVE-2020-1414, CVE-2020-1422.
7.8
HIGH
CVE-2020-1413 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1399, CVE-2020-1404, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.
7.8
HIGH
CVE-2020-1414 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1399, CVE-2020-1404, CVE-2020-1413, CVE-2020-1415, CVE-2020-1422.
7.8
HIGH
CVE-2020-1411 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1336.
7.8
HIGH
CVE-2020-1412 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1409 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'.
7.8
HIGH
CVE-2020-1410 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists when Windows Address Book (WAB) improperly processes vcard files.To exploit the vulnerability, an attacker could send a malicious vcard that a victim opens using Windows Address Book (WAB), aka 'Windows Address Book Remote Code Execution Vulnerability'.
7.8
HIGH
CVE-2020-1407 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1400, CVE-2020-1401.
7.8
HIGH
CVE-2020-1408 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka 'Microsoft Graphics Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1404 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1399, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.
7.8
HIGH
CVE-2020-1405 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions, aka 'Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1372.
7.1
HIGH
CVE-2020-1406 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Network List Service handles objects in memory, aka 'Windows Network List Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1402 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows ActiveX Installer Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows ActiveX Installer Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1403 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'.
7.5
HIGH
CVE-2020-1400 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1401, CVE-2020-1407.
7.8
HIGH
CVE-2020-1401 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1400, CVE-2020-1407.
7.8
HIGH
CVE-2020-1398 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when Windows Lockscreen fails to properly handle Ease of Access dialog.An attacker who successfully exploited the vulnerability could execute commands with elevated permissions.The security update addresses the vulnerability by ensuring that the Ease of Access dialog is handled properly., aka 'Windows Lockscreen Elevation of Privilege Vulnerability'.
6.8
MEDIUM
CVE-2020-1399 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1370, CVE-2020-1404, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.
7.8
HIGH
CVE-2020-1396 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system, aka 'Windows ALPC Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1397 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists in Windows when the Windows Imaging Component fails to properly handle objects in memory, aka 'Windows Imaging Component Information Disclosure Vulnerability'.
6.5
MEDIUM
CVE-2020-1394 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Geolocation Framework handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1388, CVE-2020-1392, CVE-2020-1395.
7.8
HIGH
CVE-2020-1395 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Speech Brokered API handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1388, CVE-2020-1392, CVE-2020-1394.
7.8
HIGH
CVE-2020-1392 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Delivery Optimization service improperly handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1388, CVE-2020-1394, CVE-2020-1395.
7.8
HIGH
CVE-2020-1393 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Diagnostics Hub Standard Collector Service fails to properly sanitize input, leading to an unsecure library-loading behavior, aka 'Windows Diagnostics Hub Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1418.
7.8
HIGH
CVE-2020-1390 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1427, CVE-2020-1428, CVE-2020-1438.
7.8
HIGH
CVE-2020-1391 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when the Windows Agent Activation Runtime (AarSvc) fails to properly handle objects in memory, aka 'Windows Agent Activation Runtime Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1387 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way the Windows Push Notification Service handles objects in memory, aka 'Windows Push Notification Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1388 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the psmsrv.dll handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1392, CVE-2020-1394, CVE-2020-1395.
7.8
HIGH
CVE-2020-1389 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1367, CVE-2020-1419, CVE-2020-1426.
5.5
MEDIUM
CVE-2020-1385 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Credential Picker handles objects in memory, aka 'Windows Credential Picker Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1386 2020-07-14 20:54 +00:00 An information vulnerability exists when Windows Connected User Experiences and Telemetry Service improperly discloses file information, aka 'Connected User Experiences and Telemetry Service Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1382 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1381.
7.8
HIGH
CVE-2020-1384 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Cryptography Next Generation (CNG) Key Isolation service improperly handles memory, aka 'Windows CNG Key Isolation Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1359.
7.8
HIGH
CVE-2020-1375 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when Windows improperly handles COM object creation, aka 'Windows COM Server Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1381 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1382.
7.8
HIGH
CVE-2020-1373 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1390, CVE-2020-1427, CVE-2020-1428, CVE-2020-1438.
7.8
HIGH
CVE-2020-1374 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server, aka 'Remote Desktop Client Remote Code Execution Vulnerability'.
7.5
HIGH
CVE-2020-1371 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Event Logging Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Event Logging Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1365.
7.8
HIGH
CVE-2020-1372 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles objects in memory, aka 'Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1405.
7.8
HIGH
CVE-2020-1369 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka 'Windows WalletService Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1344, CVE-2020-1362.
7.8
HIGH
CVE-2020-1370 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1353, CVE-2020-1399, CVE-2020-1404, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.
7.8
HIGH
CVE-2020-1366 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Print Workflow Service improperly handles objects in memory, aka 'Windows Print Workflow Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1367 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1389, CVE-2020-1419, CVE-2020-1426.
5.5
MEDIUM
CVE-2020-1368 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Credential Enrollment Manager service handles objects in memory, aka 'Windows Credential Enrollment Manager Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1364 2020-07-14 20:54 +00:00 A denial of service vulnerability exists in the way that the WalletService handles files, aka 'Windows WalletService Denial of Service Vulnerability'.
7.1
HIGH
CVE-2020-1365 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Event Logging Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Event Logging Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1371.
7.8
HIGH
CVE-2020-1362 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka 'Windows WalletService Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1344, CVE-2020-1369.
7.8
HIGH
CVE-2020-1363 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Picker Platform improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Picker Platform Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1360 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Profile Service improperly handles file operations, aka 'Windows Profile Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1361 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists in the way that the WalletService handles memory.To exploit the vulnerability, an attacker would first need code execution on a victim system, aka 'Windows WalletService Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1358 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when the Windows Resource Policy component improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Resource Policy Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1359 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Cryptography Next Generation (CNG) Key Isolation service improperly handles memory, aka 'Windows CNG Key Isolation Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1384.
7.8
HIGH
CVE-2020-1357 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows System Events Broker improperly handles file operations, aka 'Windows System Events Broker Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1354 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows UPnP Device Host Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1430.
7.8
HIGH
CVE-2020-1355 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory.An attacker who successfully exploited the vulnerability would gain execution on a victim system.The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory., aka 'Windows Font Driver Host Remote Code Execution Vulnerability'.
7.8
HIGH
CVE-2020-1351 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory, aka 'Microsoft Graphics Component Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1352 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows USO Core Worker improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows USO Core Worker Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1353 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1249, CVE-2020-1370, CVE-2020-1399, CVE-2020-1404, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.
7.8
HIGH
CVE-2020-1346 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Modules Installer improperly handles file operations, aka 'Windows Modules Installer Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1347 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations, aka 'Windows Storage Services Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1344 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka 'Windows WalletService Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1362, CVE-2020-1369.
7.8
HIGH
CVE-2020-1333 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when Group Policy Services Policy Processing improperly handle reparse points, aka 'Group Policy Services Policy Processing Elevation of Privilege Vulnerability'.
6.7
MEDIUM
CVE-2020-1336 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.
7.8
HIGH
CVE-2020-1330 2020-07-14 20:54 +00:00 An information disclosure vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions, aka 'Windows Mobile Device Management Diagnostics Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1249 2020-07-14 20:54 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1353, CVE-2020-1370, CVE-2020-1399, CVE-2020-1404, CVE-2020-1413, CVE-2020-1414, CVE-2020-1415, CVE-2020-1422.
7.8
HIGH
CVE-2020-1267 2020-07-14 20:54 +00:00 This security update corrects a denial of service in the Local Security Authority Subsystem Service (LSASS) caused when an authenticated attacker sends a specially crafted authentication request, aka 'Local Security Authority Subsystem Service Denial of Service Vulnerability'.
4.9
MEDIUM
CVE-2020-1147 2020-07-14 20:54 +00:00 A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.
7.8
HIGH
CVE-2020-1085 2020-07-14 20:53 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory, aka 'Windows Function Discovery Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-9633 2020-06-12 11:17 +00:00 Adobe Flash Player Desktop Runtime 32.0.0.371 and earlier, Adobe Flash Player for Google Chrome 32.0.0.371 and earlier, and Adobe Flash Player for Microsoft Edge and Internet Explorer 32.0.0.330 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2020-1348 2020-06-09 17:44 +00:00 An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'.
6.5
MEDIUM
CVE-2020-1334 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1231, CVE-2020-1233, CVE-2020-1235, CVE-2020-1265, CVE-2020-1282, CVE-2020-1304, CVE-2020-1306.
7.8
HIGH
CVE-2020-1324 2020-06-09 17:44 +00:00 An elevation of privilege (user to user) vulnerability exists in Windows Security Health Service when handling certain objects in memory.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1162.
7.8
HIGH
CVE-2020-1317 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists when Group Policy improperly checks access, aka 'Group Policy Elevation of Privilege Vulnerability'.
8.8
HIGH
CVE-2020-1315 2020-06-09 17:44 +00:00 An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory, aka 'Internet Explorer Information Disclosure Vulnerability'.
5.3
MEDIUM
CVE-2020-1316 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307.
7.8
HIGH
CVE-2020-1313 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists when the Windows Update Orchestrator Service improperly handles file operations, aka 'Windows Update Orchestrator Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1314 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists in Windows Text Service Framework (TSF) when the TSF server fails to properly handle messages sent from TSF clients, aka 'Windows Text Service Framework Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1311 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists when Component Object Model (COM) client uses special case IIDs, aka 'Component Object Model Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1312 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations.To exploit the vulnerability, an attacker would require unprivileged execution on the victim system, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1272, CVE-2020-1277, CVE-2020-1302.
7.8
HIGH
CVE-2020-1309 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Microsoft Store Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1222.
7.8
HIGH
CVE-2020-1306 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1231, CVE-2020-1233, CVE-2020-1235, CVE-2020-1265, CVE-2020-1282, CVE-2020-1304, CVE-2020-1334.
7.8
HIGH
CVE-2020-1307 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1316.
7.8
HIGH
CVE-2020-1304 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1231, CVE-2020-1233, CVE-2020-1235, CVE-2020-1265, CVE-2020-1282, CVE-2020-1306, CVE-2020-1334.
7.8
HIGH
CVE-2020-1305 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1301 2020-06-09 17:44 +00:00 A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests, aka 'Windows SMB Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1302 2020-06-09 17:44 +00:00 An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations.To exploit the vulnerability, an attacker would require unprivileged execution on the victim system, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1272, CVE-2020-1277, CVE-2020-1312.
7.8
HIGH
CVE-2020-1299 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1300 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files.To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver.The update addresses the vulnerability by correcting how Windows handles cabinet files., aka 'Windows Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1296 2020-06-09 17:43 +00:00 A vulnerability exists in the way the Windows Diagnostics & feedback settings app handles objects in memory, aka 'Windows Diagnostics & feedback Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1294 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka 'Windows WalletService Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1287.
7.8
HIGH
CVE-2020-1292 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in OpenSSH for Windows when it does not properly restrict access to configuration settings, aka 'OpenSSH for Windows Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1293 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles file operations, aka 'Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1257, CVE-2020-1278.
7.8
HIGH
CVE-2020-1290 2020-06-09 17:43 +00:00 An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1291 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1286 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths.An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user, aka 'Windows Shell Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1287 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka 'Windows WalletService Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1294.
7.8
HIGH
CVE-2020-1283 2020-06-09 17:43 +00:00 A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'.
6.5
MEDIUM
CVE-2020-1284 2020-06-09 17:43 +00:00 A denial of service vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Denial of Service Vulnerability'.
6.5
MEDIUM
CVE-2020-1281 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OLE Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1282 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1231, CVE-2020-1233, CVE-2020-1235, CVE-2020-1265, CVE-2020-1304, CVE-2020-1306, CVE-2020-1334.
7.8
HIGH
CVE-2020-1279 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when Windows Lockscreen fails to properly load spotlight images from a secure location, aka 'Windows Lockscreen Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1280 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Bluetooth Service handles objects in memory, aka 'Windows Bluetooth Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1277 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations.To exploit the vulnerability, an attacker would require unprivileged execution on the victim system, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1272, CVE-2020-1302, CVE-2020-1312.
7.8
HIGH
CVE-2020-1278 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles file operations, aka 'Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1257, CVE-2020-1293.
7.8
HIGH
CVE-2020-1275 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-1276 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-1273 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-1274 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-1271 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1272 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1277, CVE-2020-1302, CVE-2020-1312.
7.8
HIGH
CVE-2020-1268 2020-06-09 17:43 +00:00 An information disclosure vulnerability exists when a Windows service improperly handles objects in memory, aka 'Windows Service Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1269 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-1270 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the wlansvc.dll handles objects in memory, aka 'Windows WLAN Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1266 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-1263 2020-06-09 17:43 +00:00 An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory, aka 'Windows Error Reporting Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1261.
5.5
MEDIUM
CVE-2020-1264 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-1261 2020-06-09 17:43 +00:00 An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory, aka 'Windows Error Reporting Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1263.
5.5
MEDIUM
CVE-2020-1262 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-1259 2020-06-09 17:43 +00:00 A security feature bypass vulnerability exists when Windows Host Guardian Service improperly handles hashes recorded and logged, aka 'Windows Host Guardian Service Security Feature Bypass Vulnerability'.
4.3
MEDIUM
CVE-2020-1257 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles file operations, aka 'Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1278, CVE-2020-1293.
7.8
HIGH
CVE-2020-1258 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Elevation of Privilege Vulnerability'.
6.7
MEDIUM
CVE-2020-1253 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1207, CVE-2020-1247, CVE-2020-1251, CVE-2020-1310.
6.7
MEDIUM
CVE-2020-1254 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when Windows Modules Installer Service improperly handles class object members.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Modules Installer Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1255 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) IIS module improperly handles uploaded content, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
8.8
HIGH
CVE-2020-1248 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'.
8.8
HIGH
CVE-2020-1251 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1207, CVE-2020-1247, CVE-2020-1253, CVE-2020-1310.
6.7
MEDIUM
CVE-2020-1246 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-1247 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1207, CVE-2020-1251, CVE-2020-1253, CVE-2020-1310.
7.8
HIGH
CVE-2020-1242 2020-06-09 17:43 +00:00 An information disclosure vulnerability exists in the way that Microsoft Edge handles cross-origin requests, aka 'Microsoft Edge Information Disclosure Vulnerability'.
5.3
MEDIUM
CVE-2020-1244 2020-06-09 17:43 +00:00 A denial of service vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Denial of Service Vulnerability'. This CVE ID is unique from CVE-2020-1120.
7.1
HIGH
CVE-2020-1239 2020-06-09 17:43 +00:00 A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1238.
8.8
HIGH
CVE-2020-1241 2020-06-09 17:43 +00:00 A security feature bypass vulnerability exists when Windows Kernel fails to properly sanitize certain parameters.To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system.The update addresses the vulnerability by correcting how Windows Kernel handles parameter sanitization., aka 'Windows Kernel Security Feature Bypass Vulnerability'.
7.8
HIGH
CVE-2020-1237 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-1238 2020-06-09 17:43 +00:00 A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1239.
8.8
HIGH
CVE-2020-1234 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when Windows Error Reporting improperly handles objects in memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1235 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1231, CVE-2020-1233, CVE-2020-1265, CVE-2020-1282, CVE-2020-1304, CVE-2020-1306, CVE-2020-1334.
7.8
HIGH
CVE-2020-1236 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1208.
7.8
HIGH
CVE-2020-1232 2020-06-09 17:43 +00:00 An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory, aka 'Media Foundation Information Disclosure Vulnerability'.
6.5
MEDIUM
CVE-2020-1233 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1231, CVE-2020-1235, CVE-2020-1265, CVE-2020-1282, CVE-2020-1304, CVE-2020-1306, CVE-2020-1334.
7.8
HIGH
CVE-2020-1230 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1213, CVE-2020-1214, CVE-2020-1215, CVE-2020-1216, CVE-2020-1260.
7.5
HIGH
CVE-2020-1231 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1233, CVE-2020-1235, CVE-2020-1265, CVE-2020-1282, CVE-2020-1304, CVE-2020-1306, CVE-2020-1334.
7.8
HIGH
CVE-2020-1219 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'.
7.5
HIGH
CVE-2020-1220 2020-06-09 17:43 +00:00 A spoofing vulnerability exists when theMicrosoft Edge (Chromium-based) in IE Mode improperly handles specific redirects, aka 'Microsoft Edge (Chromium-based) in IE Mode Spoofing Vulnerability'.
6.1
MEDIUM
CVE-2020-1222 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Microsoft Store Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1309.
7.8
HIGH
CVE-2020-1216 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1213, CVE-2020-1214, CVE-2020-1215, CVE-2020-1230, CVE-2020-1260.
7.5
HIGH
CVE-2020-1217 2020-06-09 17:43 +00:00 An information disclosure vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Information Disclosure Vulnerability'.
7.8
HIGH
CVE-2020-1214 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1213, CVE-2020-1215, CVE-2020-1216, CVE-2020-1230, CVE-2020-1260.
7.5
HIGH
CVE-2020-1215 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1213, CVE-2020-1214, CVE-2020-1216, CVE-2020-1230, CVE-2020-1260.
7.5
HIGH
CVE-2020-1212 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when an OLE Automation component improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'OLE Automation Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1213 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1214, CVE-2020-1215, CVE-2020-1216, CVE-2020-1230, CVE-2020-1260.
7.5
HIGH
CVE-2020-1209 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Network List Service handles objects in memory, aka 'Windows Network List Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1211 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1207 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1247, CVE-2020-1251, CVE-2020-1253, CVE-2020-1310.
7.8
HIGH
CVE-2020-1208 2020-06-09 17:43 +00:00 A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1236.
7.8
HIGH
CVE-2020-1203 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector fail to properly handle objects in memory, aka 'Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1202.
7.8
HIGH
CVE-2020-1204 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions, aka 'Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability'.
7.1
HIGH
CVE-2020-1206 2020-06-09 17:43 +00:00 An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Information Disclosure Vulnerability'.
7.5
HIGH
CVE-2020-1201 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way the Windows Now Playing Session Manager handles objects in memory, aka 'Windows Now Playing Session Manager Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1202 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector fail to properly handle objects in memory, aka 'Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1203.
7.8
HIGH
CVE-2020-1197 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1199 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows Feedback Hub improperly handles objects in memory, aka 'Windows Feedback Hub Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1194 2020-06-09 17:43 +00:00 A denial of service vulnerability exists when Windows Registry improperly handles filesystem operations, aka 'Windows Registry Denial of Service Vulnerability'.
5.5
MEDIUM
CVE-2020-1196 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the printconfig.dll handles objects in memory, aka 'Windows Print Configuration Elevation of Privilege Vulnerability'.
7.8
HIGH
CVE-2020-1160 2020-06-09 17:43 +00:00 An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory, aka 'Microsoft Graphics Component Information Disclosure Vulnerability'.
5.5
MEDIUM
CVE-2020-1162 2020-06-09 17:43 +00:00 An elevation of privilege (user to user) vulnerability exists in Windows Security Health Service when handling certain objects in memory.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1324.
7.8
HIGH
CVE-2020-1120 2020-06-09 17:43 +00:00 A denial of service vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Denial of Service Vulnerability'. This CVE ID is unique from CVE-2020-1244.
5.5
MEDIUM
CVE-2020-0916 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, aka 'Windows GDI Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0915.
7.8
HIGH
CVE-2020-0986 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
7.8
HIGH
CVE-2020-0915 2020-06-09 17:43 +00:00 An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, aka 'Windows GDI Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0916.
7.8
HIGH
CVE-2019-7090 2019-05-24 16:41 +00:00 Flash Player Desktop Runtime versions 32.0.0.114 and earlier, Flash Player for Google Chrome versions 32.0.0.114 and earlier, and Flash Player for Microsoft Edge and Internet Explorer 11 versions 32.0.0.114 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
6.5
MEDIUM
CVE-2019-0812 2019-04-09 18:16 +00:00 A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0806, CVE-2019-0810, CVE-2019-0829, CVE-2019-0860, CVE-2019-0861.
7.5
HIGH
CVE-2018-16183 2019-01-09 21:00 +00:00 An unquoted search path vulnerability in some pre-installed applications on Panasonic PC run on Windows 7 (32bit), Windows 7 (64bit), Windows 8 (64bit), Windows 8.1 (64bit), Windows 10 (64bit) delivered in or later than October 2009 allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges.
7.8
HIGH
CVE-2018-8542 2018-11-14 00:00 +00:00 A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8543, CVE-2018-8551, CVE-2018-8555, CVE-2018-8556, CVE-2018-8557, CVE-2018-8588.
7.5
HIGH
CVE-2018-8543 2018-11-14 00:00 +00:00 A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8551, CVE-2018-8555, CVE-2018-8556, CVE-2018-8557, CVE-2018-8588.
7.5
HIGH
CVE-2018-8551 2018-11-14 00:00 +00:00 A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8555, CVE-2018-8556, CVE-2018-8557, CVE-2018-8588.
7.5
HIGH
CVE-2018-8555 2018-11-14 00:00 +00:00 A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8556, CVE-2018-8557, CVE-2018-8588.
7.5
HIGH
CVE-2018-8556 2018-11-14 00:00 +00:00 A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8555, CVE-2018-8557, CVE-2018-8588.
7.5
HIGH
CVE-2018-8557 2018-11-14 00:00 +00:00 A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8555, CVE-2018-8556, CVE-2018-8588.
7.5
HIGH
CVE-2018-8564 2018-11-14 00:00 +00:00 A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content, aka "Microsoft Edge Spoofing Vulnerability." This affects Microsoft Edge.
4.3
MEDIUM
CVE-2018-8588 2018-11-14 00:00 +00:00 A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8555, CVE-2018-8556, CVE-2018-8557.
7.5
HIGH
CVE-2018-12368 2018-10-18 11:00 +00:00 Windows 10 does not warn users before opening executable files with the SettingContent-ms extension even when they have been downloaded from the internet and have the "Mark of the Web." Without the warning, unsuspecting users unfamiliar with this new file type might run an unwanted executable. This also allows a WebExtension with the limited downloads.open permission to execute arbitrary code without user interaction on Windows 10 systems. *Note: this issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
8.1
HIGH
CVE-2018-8315 2018-09-12 22:00 +00:00 An information disclosure vulnerability exists when the browser scripting engine improperly handle object types, aka "Microsoft Scripting Engine Information Disclosure Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10.
4.2
MEDIUM
CVE-2018-8452 2018-09-12 22:00 +00:00 An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft browsers, aka "Scripting Engine Information Disclosure Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge.
4.3
MEDIUM
CVE-2018-8355 2018-08-15 15:00 +00:00 A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8353, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.
7.5
HIGH
CVE-2018-8385 2018-08-15 15:00 +00:00 A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8389, CVE-2018-8390.
7.5
HIGH
CVE-2018-4944 2018-05-19 15:00 +00:00 Adobe Flash Player versions 29.0.0.140 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
9.8
CRITICAL
CVE-2018-0887 2018-04-11 23:00 +00:00 An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
5.5
MEDIUM
CVE-2018-0960 2018-04-11 23:00 +00:00 An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
5.5
MEDIUM
CVE-2018-0968 2018-04-11 23:00 +00:00 An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
5.5
MEDIUM
CVE-2018-0969 2018-04-11 23:00 +00:00 An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
5.5
MEDIUM
CVE-2018-0970 2018-04-11 23:00 +00:00 An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
5.5
MEDIUM
CVE-2018-0971 2018-04-11 23:00 +00:00 An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
5.5
MEDIUM
CVE-2018-0972 2018-04-11 23:00 +00:00 An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
5.5
MEDIUM
CVE-2018-0973 2018-04-11 23:00 +00:00 An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0974, CVE-2018-0975.
5.5
MEDIUM
CVE-2018-0974 2018-04-11 23:00 +00:00 An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0975.
5.5
MEDIUM
CVE-2018-0975 2018-04-11 23:00 +00:00 An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974.
5.5
MEDIUM
CVE-2018-5511 2018-04-11 22:00 +00:00 On F5 BIG-IP 13.1.0-13.1.0.3 or 13.0.0, when authenticated administrative users execute commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, restrictions on allowed commands may not be enforced.
7.2
HIGH
CVE-2018-6947 2018-02-28 21:00 +00:00 An uninitialised stack variable in the nxfuse component that is part of the Open Source DokanFS library shipped with NoMachine 6.0.66_2 and earlier allows a local low privileged user to gain elevation of privileges on Windows 7 (32 and 64bit), and denial of service for Windows 8 and 10.
7.8
HIGH
CVE-2018-4877 2018-02-06 19:00 +00:00 A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player's quality of service functionality. A successful attack can lead to arbitrary code execution.
9.8
CRITICAL
CVE-2018-4878 2018-02-06 19:00 +00:00 A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
9.8
CRITICAL
CVE-2017-11839 2017-11-15 02:00 +00:00 Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to take control of an affected system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
7.5
HIGH
CVE-2017-11791 2017-11-13 23:00 +00:00 ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to obtain information to further compromise the user's system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11834.
3.1
LOW
CVE-2017-11833 2017-11-13 23:00 +00:00 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to determine the origin of all webpages in the affected browser, due to how Microsoft Edge handles cross-origin requests, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11803 and CVE-2017-11844.
3.1
LOW
CVE-2017-11837 2017-11-13 23:00 +00:00 ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
7.5
HIGH
CVE-2017-11838 2017-11-13 23:00 +00:00 ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
7.5
HIGH
CVE-2017-11843 2017-11-13 23:00 +00:00 ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
7.5
HIGH
CVE-2017-11846 2017-11-13 23:00 +00:00 ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
7.5
HIGH
CVE-2017-11847 2017-11-13 23:00 +00:00 Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to run arbitrary code in kernel mode, install programs, view, change or delete data, and create new accounts with full user rights due to improperly handing objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability".
7.8
HIGH
CVE-2017-11849 2017-11-13 23:00 +00:00 Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log in and run a specially crafted application due to the Windows kernel improperly initializing a memory address, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11842, CVE-2017-11851, and CVE-2017-11853.
4.7
MEDIUM
CVE-2017-11853 2017-11-13 23:00 +00:00 Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log in and run a specially crafted application due to the Windows kernel improperly initializing a memory address, aka "Windows Kernel Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11842, CVE-2017-11849, and CVE-2017-11851.
5.5
MEDIUM
CVE-2017-11858 2017-11-13 23:00 +00:00 ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Microsoft browsers handle objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
7.5
HIGH
CVE-2017-11863 2017-11-13 23:00 +00:00 Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to trick a user into loading a page containing malicious content, due to how the Edge Content Security Policy (CSP) validates documents, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-11872 and CVE-2017-11874.
6.1
MEDIUM
CVE-2017-11880 2017-11-13 23:00 +00:00 Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to run a specially crafted application and obtain information to further compromise the user's system due to the Windows kernel improperly initializing objects in memory, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11831.
4.7
MEDIUM
CVE-2017-14010 2017-10-18 22:00 +00:00 In SpiderControl MicroBrowser Windows XP, Vista 7, 8 and 10, Versions 1.6.30.144 and prior, an uncontrolled search path element vulnerability has been identified which could be exploited by placing a specially crafted DLL file in the search path. If the malicious DLL is loaded prior to the valid DLL, an attacker could execute arbitrary code on the system.
7.8
HIGH
CVE-2017-3756 2017-08-09 22:00 +00:00 A privilege escalation vulnerability was identified in Lenovo Active Protection System for ThinkPad systems versions earlier than 1.82.0.17. An attacker with local privileges could execute code with administrative privileges via an unquoted service path.
7.8
HIGH
CVE-2016-0959 2017-06-27 18:00 +00:00 Use after free vulnerability in Adobe Flash Player Desktop Runtime before 20.0.0.267, Adobe Flash Player Extended Support Release before 18.0.0.324, Adobe Flash Player for Google Chrome before 20.0.0.267, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 before 20.0.0.267, Adobe Flash Player for Internet Explorer 10 and 11 before 20.0.0.267, Adobe Flash Player for Linux before 11.2.202.559, AIR Desktop Runtime before 20.0.0.233, AIR SDK before 20.0.0.233, AIR SDK & Compiler before 20.0.0.233, AIR for Android before 20.0.0.233.
9.8
CRITICAL
CVE-2017-3747 2017-06-21 22:00 +00:00 Privilege escalation vulnerability in Lenovo Nerve Center for Windows 10 on Desktop systems (Lenovo Nerve Center for notebook systems is not affected) that could allow an attacker with local privileges on a system to alter registry keys.
5.5
MEDIUM
CVE-2017-3075 2017-06-20 15:00 +00:00 Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability when manipulating the ActionsScript 2 XML class. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3076 2017-06-20 15:00 +00:00 Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the MPEG-4 AVC module. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3077 2017-06-20 15:00 +00:00 Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the PNG image parser. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3078 2017-06-20 15:00 +00:00 Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3079 2017-06-20 15:00 +00:00 Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the internal representation of raster data. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3081 2017-06-20 15:00 +00:00 Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability during internal computation caused by multiple display object mask manipulations. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3082 2017-06-20 15:00 +00:00 Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the LocaleID class. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-0193 2017-06-14 23:00 +00:00 Windows Hyper-V in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to gain elevated privileges on a target guest operating system when Windows Hyper-V instruction emulation fails to properly enforce privilege levels, aka "Hypervisor Code Integrity Elevation of Privilege Vulnerability".
7.8
HIGH
CVE-2017-0283 2017-06-14 23:00 +00:00 Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, Windows Server 2016, Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office Word Viewer, Microsoft Lync 2013 SP1, Skype for Business 2016, Microsoft Silverlight 5 Developer Runtime when installed on Microsoft Windows, and Microsoft Silverlight 5 when installed on Microsoft Windows allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Uniscribe Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8528.
8.8
HIGH
CVE-2017-8538 2017-05-26 18:00 +00:00 The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8540 and CVE-2017-8541.
7.8
HIGH
CVE-2017-8539 2017-05-26 18:00 +00:00 The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8536, CVE-2017-8537, and CVE-2017-8542.
5.5
MEDIUM
CVE-2017-8541 2017-05-26 18:00 +00:00 The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8538 and CVE-2017-8540.
7.8
HIGH
CVE-2017-8542 2017-05-26 18:00 +00:00 The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8536, CVE-2017-8537, and CVE-2017-8539.
5.5
MEDIUM
CVE-2017-0258 2017-05-12 12:00 +00:00 The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows authenticated attackers to obtain sensitive information via a specially crafted document, aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-0175, CVE-2017-0220, and CVE-2017-0259.
4.7
MEDIUM
CVE-2017-8360 2017-05-12 04:54 +00:00 Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\Users\Public\MicTray.log by any process.
5.5
MEDIUM
CVE-2017-0058 2017-04-12 12:00 +00:00 A Win32k information disclosure vulnerability exists in Microsoft Windows when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system, aka "Win32k Information Disclosure Vulnerability."
4.7
MEDIUM
CVE-2017-0156 2017-04-12 12:00 +00:00 An elevation of privilege vulnerability exists in Windows 7, Windows 8.1, Windows RT 8.1, Windows 10, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 when the Microsoft Graphics Component fails to properly handle objects in memory, aka "Windows Graphics Component Elevation of Privilege Vulnerability."
7
HIGH
CVE-2017-0158 2017-04-12 12:00 +00:00 An elevation of privilege vulnerability exists when Microsoft Windows running on Windows 10, Windows 10 1511, Windows 8.1 Windows RT 8.1, and Windows Server 2012 R2 fails to properly sanitize handles in memory, aka "Scripting Engine Memory Corruption Vulnerability."
7.5
HIGH
CVE-2017-0162 2017-04-12 12:00 +00:00 A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a Windows 10, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0163, CVE-2017-0180, and CVE-2017-0181.
7.6
HIGH
CVE-2017-0163 2017-04-12 12:00 +00:00 A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0162, CVE-2017-0180, and CVE-2017-0181.
7.6
HIGH
CVE-2017-0165 2017-04-12 12:00 +00:00 An elevation of privilege vulnerability exists when Microsoft Windows running on Windows 10, Windows 10 1511, Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 fails to properly sanitize handles in memory, aka "Windows Elevation of Privilege Vulnerability."
7.8
HIGH
CVE-2017-0166 2017-04-12 12:00 +00:00 An elevation of privilege vulnerability exists in Windows when LDAP request buffer lengths are improperly calculated. In a remote attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to send malicious traffic to a Domain Controller, aka "LDAP Elevation of Privilege Vulnerability."
8.1
HIGH
CVE-2017-0167 2017-04-12 12:00 +00:00 An information disclosure vulnerability exists in Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 10, and Windows Server 2016 when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system, a.k.a. "Windows Kernel Information Disclosure Vulnerability."
5.5
MEDIUM
CVE-2017-0178 2017-04-12 12:00 +00:00 A denial of service vulnerability exists when Microsoft Hyper-V running on Windows 10, Windows 10 1511, Windows 10 1607, Windows 8.1, Windows Server 2012 R2, and Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0179, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, CVE-2017-0185, and CVE-2017-0186.
5.4
MEDIUM
CVE-2017-0179 2017-04-12 12:00 +00:00 A denial of service vulnerability exists when Microsoft Hyper-V running on a Windows 10, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, CVE-2017-0185, and CVE-2017-0186.
5.8
MEDIUM
CVE-2017-0180 2017-04-12 12:00 +00:00 A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0162, CVE-2017-0163, and CVE-2017-0181.
7.6
HIGH
CVE-2017-0181 2017-04-12 12:00 +00:00 A remote code execution vulnerability exists when Windows Hyper-V Network Switch running on a Windows 10 or Windows Server 2016 host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This CVE ID is unique from CVE-2017-0162, CVE-2017-0163, and CVE-2017-0180.
7.6
HIGH
CVE-2017-0182 2017-04-12 12:00 +00:00 A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows Server 2008 R2, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0183, CVE-2017-0184, CVE-2017-0185, and CVE-2017-0186.
5.8
MEDIUM
CVE-2017-0183 2017-04-12 12:00 +00:00 A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows Server 2008 R2, Windows 8.1, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0182, CVE-2017-0184, CVE-2017-0185, and CVE-2017-0186.
5.8
MEDIUM
CVE-2017-0184 2017-04-12 12:00 +00:00 A denial of service vulnerability exists when Microsoft Hyper-V running on a host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0182, CVE-2017-0183, CVE-2017-0185, and CVE-2017-0186.
5.4
MEDIUM
CVE-2017-0185 2017-04-12 12:00 +00:00 A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, and CVE-2017-0186.
5.8
MEDIUM
CVE-2017-0186 2017-04-12 12:00 +00:00 A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, and CVE-2017-0185.
5.8
MEDIUM
CVE-2017-0188 2017-04-12 12:00 +00:00 A Win32k information disclosure vulnerability exists in Windows 8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, Windows 10, and Windows Server 2016 when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system, aka "Win32k Information Disclosure Vulnerability." This CVE ID is unique from CVE-2017-0189.
3.3
LOW
CVE-2017-0189 2017-04-12 12:00 +00:00 An elevation of privilege vulnerability exists in Windows 10 when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode, aka "Win32k Elevation of Privilege Vulnerability." This CVE ID is unique from CVE-2017-0188.
7.8
HIGH
CVE-2017-0191 2017-04-12 12:00 +00:00 A denial of service vulnerability exists in the way that Windows 7, Windows 8.1, Windows 10, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding, aka "Windows Denial of Service Vulnerability."
5.8
MEDIUM
CVE-2017-0192 2017-04-12 12:00 +00:00 The Adobe Type Manager Font Driver (ATMFD.dll) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold , 1511, 1607, and 1703 allows an attacker to gain sensitive information via a specially crafted document or an untrusted website, aka "ATMFD.dll Information Disclosure Vulnerability."
4.3
MEDIUM
CVE-2017-0211 2017-04-12 12:00 +00:00 An elevation of privilege vulnerability exists in Windows 10, Windows 8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016 versions of Microsoft Windows OLE when it fails an integrity-level check, aka "Windows OLE Elevation of Privilege Vulnerability."
5.5
MEDIUM
CVE-2017-3058 2017-04-12 12:00 +00:00 Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the sound class. Successful exploitation could lead to arbitrary code execution.
7.8
HIGH
CVE-2017-3059 2017-04-12 12:00 +00:00 Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the internal script object. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3060 2017-04-12 12:00 +00:00 Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the ActionScript2 code parser. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3061 2017-04-12 12:00 +00:00 Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the SWF parser. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3062 2017-04-12 12:00 +00:00 Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in ActionScript2 when creating a getter/setter property. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3063 2017-04-12 12:00 +00:00 Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the ActionScript2 NetStream class. Successful exploitation could lead to arbitrary code execution.
9.8
CRITICAL
CVE-2017-3064 2017-04-12 12:00 +00:00 Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability when parsing a shape outline. Successful exploitation could lead to arbitrary code execution.
7.8
HIGH
CVE-2017-0010 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0015 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0024 2017-03-16 23:00 +00:00 The kernel-mode drivers in Microsoft Windows 10 1607 and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, and CVE-2017-0082.
7.8
HIGH
CVE-2017-0032 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0035 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0067 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0070 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0074 2017-03-16 23:00 +00:00 Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0076, CVE-2017-0097, and CVE-2017-0099.
5.4
MEDIUM
CVE-2017-0076 2017-03-16 23:00 +00:00 Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0074, CVE-2017-0097, and CVE-2017-0099.
5.4
MEDIUM
CVE-2017-0084 2017-03-16 23:00 +00:00 Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090.
8.8
HIGH
CVE-2017-0094 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0097 2017-03-16 23:00 +00:00 Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0074, CVE-2017-0076, and CVE-2017-0099.
5.4
MEDIUM
CVE-2017-0131 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0132 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0134 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0137 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0138 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0141 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0150, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0150 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, and CVE-2017-0151.
7.5
HIGH
CVE-2017-0151 2017-03-16 23:00 +00:00 A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, and CVE-2017-0150.
7.5
HIGH
CVE-2016-8008 2017-03-14 21:00 +00:00 Privilege escalation vulnerability in Windows 7 and Windows 10 in McAfee Security Scan Plus (SSP) 3.11.376 allows attackers to load a replacement of the version.dll file via McAfee McUICnt.exe onto a Windows system.
8.8
HIGH
CVE-2016-4171 2016-06-16 12:00 +00:00 Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016.
9.8
CRITICAL
CVE-2016-3215 2016-06-15 23:00 +00:00 Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows 10 1511, and Microsoft Edge allow remote attackers to obtain sensitive information from process memory via a crafted PDF document, aka "Windows PDF Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3201.
5.5
MEDIUM
CVE-2016-0168 2016-05-10 23:00 +00:00 GDI in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to obtain sensitive information via a crafted document, aka "Windows Graphics Component Information Disclosure Vulnerability," a different vulnerability than CVE-2016-0169.
6.5
MEDIUM
CVE-2016-0170 2016-05-10 23:00 +00:00 GDI in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted document, aka "Windows Graphics Component RCE Vulnerability."
8.8
HIGH
CVE-2016-0171 2016-05-10 23:00 +00:00 The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0173, CVE-2016-0174, and CVE-2016-0196.
7.8
HIGH
CVE-2016-0173 2016-05-10 23:00 +00:00 The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0171, CVE-2016-0174, and CVE-2016-0196.
7.8
HIGH
CVE-2016-0174 2016-05-10 23:00 +00:00 The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0171, CVE-2016-0173, and CVE-2016-0196.
7.8
HIGH
CVE-2016-0175 2016-05-10 23:00 +00:00 The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to obtain sensitive information about kernel-object addresses, and consequently bypass the KASLR protection mechanism, via a crafted application, aka "Win32k Information Disclosure Vulnerability."
3.3
LOW
CVE-2016-0176 2016-05-10 23:00 +00:00 dxgkrnl.sys in the DirectX Graphics kernel subsystem in the kernel-mode drivers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability."
7.8
HIGH
CVE-2016-0179 2016-05-10 23:00 +00:00 Windows Shell in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Shell Remote Code Execution Vulnerability."
7.8
HIGH
CVE-2016-0180 2016-05-10 23:00 +00:00 The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mishandles symbolic links, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability."
7.8
HIGH
CVE-2016-0196 2016-05-10 23:00 +00:00 The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0171, CVE-2016-0173, and CVE-2016-0174.
7.8
HIGH
CVE-2016-0197 2016-05-10 23:00 +00:00 dxgkrnl.sys in the DirectX Graphics kernel subsystem in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability."
7.8
HIGH
CVE-2015-8823 2016-04-22 16:00 +00:00 Use-after-free vulnerability in the TextField object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted text property, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, CVE-2015-8454, CVE-2015-8653, CVE-2015-8655, CVE-2015-8821, and CVE-2015-8822.
8.8
HIGH
CVE-2016-0088 2016-04-12 21:00 +00:00 Hyper-V in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability."
9.3
CRITICAL
CVE-2016-0089 2016-04-12 21:00 +00:00 Hyper-V in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows guest OS users to obtain sensitive information from host OS memory via a crafted application, aka "Hyper-V Information Disclosure Vulnerability."
7.1
HIGH
CVE-2016-0090 2016-04-12 21:00 +00:00 Hyper-V in Microsoft Windows 8.1, Windows Server 2012 R2, and Windows 10 allows guest OS users to obtain sensitive information from host OS memory via a crafted application, aka "Hyper-V Information Disclosure Vulnerability."
7.1
HIGH
CVE-2015-6184 2016-03-09 22:00 +00:00 The CAttrArray object implementation in Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and memory corruption) via a malformed Cascading Style Sheets (CSS) token sequence in conjunction with modifications to HTML elements, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6048 and CVE-2015-6049.
8.1
HIGH
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.