Show filters
2,858 Total Results
Displaying 131-140 of 2,858
Sort by:
Attacker Value
Unknown
CVE-2021-36965
Disclosure Date: September 15, 2021 (last updated November 28, 2024)
Windows WLAN AutoConfig Service Remote Code Execution Vulnerability
1
Attacker Value
Unknown
CVE-2021-36963
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
Windows Common Log File System Driver Elevation of Privilege Vulnerability
1
Attacker Value
Unknown
CVE-2021-26424
Disclosure Date: August 12, 2021 (last updated November 28, 2024)
Windows TCP/IP Remote Code Execution Vulnerability
1
Attacker Value
Unknown
CVE-2021-26896
Disclosure Date: March 11, 2021 (last updated November 28, 2024)
Windows DNS Server Denial of Service Vulnerability
1
Attacker Value
Unknown
CVE-2021-1648
Disclosure Date: January 12, 2021 (last updated February 22, 2025)
Microsoft splwow64 Elevation of Privilege Vulnerability
1
Attacker Value
Unknown
CVE-2021-1678
Disclosure Date: January 12, 2021 (last updated November 28, 2024)
Windows Print Spooler Spoofing Vulnerability
1
Attacker Value
Unknown
CVE-2020-17051
Disclosure Date: November 11, 2020 (last updated November 28, 2024)
Windows Network File System Remote Code Execution Vulnerability
1
Attacker Value
Unknown
CVE-2020-1472
Disclosure Date: August 17, 2020 (last updated February 21, 2025)
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.
To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access.
Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels.
For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020).
When the second phase of Windows updates become available in Q1 2021, customers…
1
Attacker Value
Unknown
CVE-2013-3900
Disclosure Date: December 11, 2013 (last updated February 11, 2025)
Why is Microsoft republishing a CVE from 2013?
We are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, except for clarifications about how to configure the EnableCertPaddingCheck registry value, the information herein remains unchanged from the original text published on December 10, 2013,
Microsoft does not plan to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. This behavior remains available as an opt-in feature via reg key setting, and is available on supported editions of Windows released since December 10, 2013. This includes all currently supported versions of Windows 10 and Windows 11. The supporting code for this reg key was incorporated at the time of release for W…
1
Attacker Value
Unknown
CVE-2025-27091
Disclosure Date: February 20, 2025 (last updated February 21, 2025)
OpenH264 is a free license codec library which supports H.264 encoding and decoding. A vulnerability in the decoding functions of OpenH264 codec library could allow a remote, unauthenticated attacker to trigger a heap overflow. This vulnerability is due to a race condition between a Sequence Parameter Set (SPS) memory allocation and a subsequent non Instantaneous Decoder Refresh (non-IDR) Network Abstraction Layer (NAL) unit memory usage. An attacker could exploit this vulnerability by crafting a malicious bitstream and tricking a victim user into processing an arbitrary video containing the malicious bistream. An exploit could allow the attacker to cause an unexpected crash in the victim's user decoding client and, possibly, perform arbitrary commands on the victim's host by abusing the heap overflow. This vulnerability affects OpenH264 2.5.0 and earlier releases. Both Scalable Video Coding (SVC) mode and Advanced Video Coding (AVC) mode are affected by this vulnerability. OpenH264 s…
0