Show filters
4,015 Total Results
Displaying 31-40 of 4,015
Sort by:
Attacker Value
Very High

CVE-2022-41073

Disclosure Date: November 09, 2022 (last updated February 05, 2025)
Windows Print Spooler Elevation of Privilege Vulnerability
4
Attacker Value
Unknown

CVE-2022-34721

Disclosure Date: September 13, 2022 (last updated January 11, 2025)
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
Attacker Value
High

CVE-2022-26904

Disclosure Date: April 15, 2022 (last updated November 29, 2024)
Windows User Profile Service Elevation of Privilege Vulnerability
4
Attacker Value
Very High

CVE-2022-26809

Disclosure Date: April 15, 2022 (last updated November 29, 2024)
Remote Procedure Call Runtime Remote Code Execution Vulnerability
4
Attacker Value
Moderate

CVE-2022-21999

Disclosure Date: February 09, 2022 (last updated November 29, 2024)
Windows Print Spooler Elevation of Privilege Vulnerability
4
Attacker Value
High

CVE-2022-21919

Disclosure Date: January 11, 2022 (last updated November 28, 2024)
Windows User Profile Service Elevation of Privilege Vulnerability
4
Attacker Value
Moderate

CVE-2021-31201

Disclosure Date: June 08, 2021 (last updated November 28, 2024)
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
3
Attacker Value
Moderate

CVE-2021-31199

Disclosure Date: June 08, 2021 (last updated November 28, 2024)
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
3
Attacker Value
Moderate

CVE-2020-1938

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, alo…
Attacker Value
Moderate

CVE-2020-0668

Disclosure Date: February 11, 2020 (last updated February 21, 2025)
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672.