Show filters
2,077 Total Results
Displaying 21-30 of 2,077
Sort by:
Attacker Value
Moderate
CVE-2020-0668
Disclosure Date: February 11, 2020 (last updated February 21, 2025)
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672.
1
Attacker Value
Unknown
CVE-2021-38666
Disclosure Date: November 10, 2021 (last updated November 28, 2024)
Remote Desktop Client Remote Code Execution Vulnerability
3
Attacker Value
High
CVE-2021-34448
Disclosure Date: July 16, 2021 (last updated November 28, 2024)
Scripting Engine Memory Corruption Vulnerability
3
Attacker Value
Very Low
CVE-2021-24094
Disclosure Date: February 25, 2021 (last updated November 28, 2024)
Windows TCP/IP Remote Code Execution Vulnerability
3
Attacker Value
Low
CVE-2020-12695 "CallStranger"
Disclosure Date: June 08, 2020 (last updated February 21, 2025)
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
2
Attacker Value
Low
ADV200006 - Type 1 Font Parsing Remote Code Execution Vulnerability in Windows
Disclosure Date: April 15, 2020 (last updated October 06, 2023)
A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1020.
1
Attacker Value
Moderate
CVE-2020-0787 Windows BITS Privesc
Disclosure Date: March 12, 2020 (last updated February 21, 2025)
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
1
Attacker Value
High
CVE-2019-1458
Disclosure Date: December 10, 2019 (last updated November 27, 2024)
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
3
Attacker Value
Very High
CVE-2019-1388
Disclosure Date: November 12, 2019 (last updated November 27, 2024)
An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'.
3
Attacker Value
Unknown
CVE-2017-0147
Disclosure Date: March 17, 2017 (last updated July 03, 2024)
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted packets, aka "Windows SMB Information Disclosure Vulnerability."
3