Show filters
6,697 Total Results
Displaying 21-30 of 6,697
Sort by:
Attacker Value
High
CVE-2022-21882
Disclosure Date: January 11, 2022 (last updated November 16, 2024)
Win32k Elevation of Privilege Vulnerability
5
Attacker Value
High
CVE-2021-36955
Disclosure Date: September 15, 2021 (last updated November 28, 2024)
Windows Common Log File System Driver Elevation of Privilege Vulnerability
5
Attacker Value
Unknown
CVE-2021-34484
Disclosure Date: August 12, 2021 (last updated November 28, 2024)
Windows User Profile Service Elevation of Privilege Vulnerability
5
Attacker Value
High
CVE-2021-33771
Disclosure Date: July 14, 2021 (last updated November 28, 2024)
Windows Kernel Elevation of Privilege Vulnerability
5
Attacker Value
Unknown
CVE-2021-33742
Disclosure Date: June 08, 2021 (last updated February 22, 2025)
Windows MSHTML Platform Remote Code Execution Vulnerability
5
Attacker Value
High
CVE-2021-1732
Disclosure Date: February 25, 2021 (last updated February 22, 2025)
Windows Win32k Elevation of Privilege Vulnerability
6
Attacker Value
Low
CVE-2020-0986
Disclosure Date: June 09, 2020 (last updated February 21, 2025)
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
4
Attacker Value
Moderate
CVE-2023-29336
Disclosure Date: May 09, 2023 (last updated January 11, 2025)
Win32k Elevation of Privilege Vulnerability
4
Attacker Value
Very High
CVE-2023-21752
Disclosure Date: January 10, 2023 (last updated January 11, 2025)
Windows Backup Service Elevation of Privilege Vulnerability
5
Attacker Value
Very Low
CVE-2022-29799 "Nimbuspwn"
Disclosure Date: September 21, 2022 (last updated October 08, 2023)
A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the “/etc/networkd-dispatcher” base directory.
5