CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally. |
Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network. |
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. |
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. |
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. |
Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content. |
Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network. |
Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally. |
Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally. |
Insufficient verification of data authenticity in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally. |
Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network. |
Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally. |
Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. |
Improper access control in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network. |
Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally. |
Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Win32K - GRFX allows an unauthorized attacker to elevate privileges over a network. |
Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally. |
Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally. |