CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally. |
Out-of-bounds read in Windows DWM allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Kernel allows an unauthorized attacker to elevate privileges locally. |
Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. |
Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally. |
Use after free in Windows NTFS allows an unauthorized attacker to elevate privileges locally. |
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. |
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. |
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. |
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. |
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. |
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. |
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. |
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Remote Desktop Services allows an authorized attacker to elevate privileges locally. |
A flaw was found in the cookie date handling logic of the libsoup HTTP library, widely used by GNOME and other applications for web communication. When processing cookies with specially crafted expiration dates, the library may perform an out-of-bounds memory read. This flaw could result in unintended disclosure of memory contents, potentially exposing sensitive information from the process using libsoup. |
Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally. |
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. |
Copilot Spoofing Vulnerability |