CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Windows Telephony Service Remote Code Execution Vulnerability |
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Windows Telephony Service Remote Code Execution Vulnerability |
Secure Boot Security Feature Bypass Vulnerability |
Windows BitLocker Information Disclosure Vulnerability |
Windows BitLocker Information Disclosure Vulnerability |
Windows Telephony Service Remote Code Execution Vulnerability |
Windows Telephony Service Remote Code Execution Vulnerability |
The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. On systems that do not have hypervisor-protected code integrity (HVCI) enabled, entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate’s TBS hash along with a 'FileAttribRef' qualifier (such as file name or version) will not be blocked. This vulnerability affects any Windows system that does not have HVCI enabled or supported (HVCI is available in Windows 10, Windows 11, and Windows Server 2016 and later). NOTE: The vendor states that the driver blocklist is intended for use with HVCI, while systems without HVCI should use App Control, and any custom blocklist entries require a granular approach for proper enforcement. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. |
Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
Integer overflow or wraparound in Microsoft Graphics Component allows an authorized attacker to execute code locally. |
Protection mechanism failure in Windows SmartScreen allows an unauthorized attacker to bypass a security feature over a network. |
Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network. |
Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
Time-of-check time-of-use (toctou) race condition in Microsoft Windows QoS scheduler allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. |
Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. |