CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network. |
Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally. |
Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. |
Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally. |
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network. |
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
Untrusted pointer dereference in Windows MBT Transport driver allows an authorized attacker to elevate privileges locally. |
Active Directory Domain Services Elevation of Privilege Vulnerability |
A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files.
In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded.
The update addresses the vulnerability by correcting how Windows validates file signatures.
|
Windows Kernel Local Elevation of Privilege Vulnerability |
Windows Print Spooler Remote Code Execution Vulnerability |
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability |
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability |