CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network. |
Protection mechanism failure in Windows SmartScreen allows an unauthorized attacker to bypass a security feature over a network. |
Improper link resolution before file access ('link following') in Visual Studio allows an unauthorized attacker to elevate privileges over a network. |
Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Teams allows an authorized attacker to elevate privileges locally. |
Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network. |
Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
Time-of-check time-of-use (toctou) race condition in Microsoft Windows QoS scheduler allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. |
Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Notification allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Connected Devices Platform Service allows an unauthorized attacker to execute code over a network. |
Uncontrolled resource consumption in Windows Print Spooler Components allows an authorized attacker to deny service over an adjacent network. |
Use of uninitialized resource in SQL Server allows an unauthorized attacker to disclose information over a network. |
Trust boundary violation in Visual Studio Code - Python extension allows an unauthorized attacker to execute code locally. |
Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network. |
Heap-based buffer overflow in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. |
Improper control of generation of code ('code injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |