| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. |
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. |
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. |
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. |
| Uncontrolled resource consumption in Windows Local Security Authority Subsystem Service (LSASS) allows an unauthorized attacker to deny service over a network. |
| Improper access control in Windows Storage Port Driver allows an authorized attacker to disclose information locally. |
| Improper link resolution before file access ('link following') in Windows Recovery Driver allows an authorized attacker to elevate privileges locally. |
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. |
| Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. |
| Integer overflow or wraparound in Windows SMB allows an authorized attacker to elevate privileges locally. |
| Out-of-bounds read in Windows Media allows an authorized attacker to elevate privileges locally. |
| Out-of-bounds read in Remote Desktop Client allows an unauthorized attacker to disclose information over a network. |
| Improper access control in Windows Installer allows an authorized attacker to elevate privileges locally. |
| Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
| Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. |
| Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. |
| Untrusted search path in .NET and Visual Studio allows an unauthorized attacker to execute code over a network. |
| Missing release of memory after effective lifetime in Windows Cryptographic Services allows an unauthorized attacker to execute code over a network. |
| Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
| Directory Traversal (Local File Inclusion) vulnerability in Tikit (now Advanced) eMarketing platform 6.8.3.0 allows a remote attacker to read arbitrary files and obtain sensitive information via a crafted payload to the filename parameter to the OpenLogFile endpoint. |