Show filters
1,417 Total Results
Displaying 31-40 of 1,417
Sort by:
Attacker Value
Unknown

CVE-2021-38666

Disclosure Date: November 10, 2021 (last updated November 28, 2024)
Remote Desktop Client Remote Code Execution Vulnerability
3
Attacker Value
Unknown

CVE-2021-36959

Disclosure Date: September 15, 2021 (last updated November 28, 2024)
Windows Authenticode Spoofing Vulnerability
3
Attacker Value
High

CVE-2021-26899

Disclosure Date: March 11, 2021 (last updated November 28, 2024)
Windows UPnP Device Host Elevation of Privilege Vulnerability
2
Attacker Value
Moderate

CVE-2020-1301 Windows SMB Remote Code Execution Vulnerability

Disclosure Date: June 09, 2020 (last updated October 06, 2023)
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests, aka 'Windows SMB Remote Code Execution Vulnerability'.
Attacker Value
Unknown

CVE-2021-28310

Disclosure Date: April 13, 2021 (last updated February 22, 2025)
Win32k Elevation of Privilege Vulnerability
1
Attacker Value
Very High

CVE-2022–26923 aka Certifried

Last updated January 02, 2025
Active Directory Domain Services Elevation of Privilege Vulnerability
1
Attacker Value
Moderate

CVE-2020-1292 OpenSSH for Windows Elevation of Privilege Vulnerability

Disclosure Date: June 09, 2020 (last updated October 06, 2023)
An elevation of privilege vulnerability exists in OpenSSH for Windows when it does not properly restrict access to configuration settings, aka 'OpenSSH for Windows Elevation of Privilege Vulnerability'.
Attacker Value
High

CVE-2020-17136

Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
1
Attacker Value
High

CVE-2022-21874

Disclosure Date: January 11, 2022 (last updated December 21, 2023)
Windows Security Center API Remote Code Execution Vulnerability
Attacker Value
Low

CVE-2020-1241

Disclosure Date: June 09, 2020 (last updated November 28, 2024)
A security feature bypass vulnerability exists when Windows Kernel fails to properly sanitize certain parameters.To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system.The update addresses the vulnerability by correcting how Windows Kernel handles parameter sanitization., aka 'Windows Kernel Security Feature Bypass Vulnerability'.