CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to elevate privileges over an adjacent network. |
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. |
Time-of-check time-of-use (toctou) race condition in NtQueryInformation Token function (ntifs.h) allows an authorized attacker to elevate privileges locally. |
Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network. |
Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally. |
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. |
Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally. |
Out-of-bounds read in Windows DWM allows an authorized attacker to elevate privileges locally. |
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.
Fax modem hardware dependent on this specific driver will no longer work on Windows.
Microsoft recommends removing any existing dependencies on this hardware. |
Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network. |
Improper authentication in Windows Remote Desktop Protocol allows an authorized attacker to bypass a security feature locally. |
Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. |
Exposure of sensitive information to an unauthorized actor in Windows Cloud Files Mini Filter Driver allows an authorized attacker to disclose information locally. |
Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges over a network. |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
Missing Ability to Patch ROM Code in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. |
Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. |
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. |