Show filters
3,230 Total Results
Displaying 51-60 of 3,230
Sort by:
Attacker Value
Unknown
CVE-2017-0022
Disclosure Date: March 17, 2017 (last updated July 03, 2024)
Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka "Microsoft XML Information Disclosure Vulnerability."
1
Attacker Value
Very High
CVE-2021-36942
Disclosure Date: August 12, 2021 (last updated February 23, 2025)
Windows LSA Spoofing Vulnerability
1
Attacker Value
High
CVE-2024-49019
Disclosure Date: November 12, 2024 (last updated January 06, 2025)
Active Directory Certificate Services Elevation of Privilege Vulnerability
1
Attacker Value
Unknown
CVE-2024-38077
Disclosure Date: July 09, 2024 (last updated January 12, 2025)
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
2
Attacker Value
Unknown
CVE-2014-6324 - Microsoft Kerberos Checksum Validation Vulnerability
Disclosure Date: November 18, 2014 (last updated July 17, 2024)
The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability."
0
Attacker Value
Unknown
CVE-2015-0016
Disclosure Date: January 13, 2015 (last updated July 03, 2024)
Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability."
1
Attacker Value
Unknown
CVE-2014-4113
Disclosure Date: October 15, 2014 (last updated July 03, 2024)
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
1
Attacker Value
Unknown
CVE-2016-0165
Disclosure Date: April 12, 2016 (last updated June 28, 2024)
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0167.
1
Attacker Value
Unknown
CVE-2014-4148
Disclosure Date: October 15, 2014 (last updated June 29, 2024)
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted TrueType font, as exploited in the wild in October 2014, aka "TrueType Font Parsing Remote Code Execution Vulnerability."
1
Attacker Value
Unknown
CVE-2014-4114
Disclosure Date: October 15, 2014 (last updated July 17, 2024)
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
1