| CVE | Vendors | Products | Updated | CVSS v3.1 | 
        | Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network. | 
    
    
    
        | Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. | 
    
    
    
        | Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network. | 
    
    
    
        | Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack. | 
    
    
    
        | External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally. | 
    
    
    
        | External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally. | 
    
    
    
        | Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. | 
    
    
    
        | Improper verification of cryptographic signature in GitHub allows an unauthorized attacker to perform spoofing over an adjacent network. | 
    
    
    
        | Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally. | 
    
    
    
        | Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally. | 
    
    
    
        | Improper link resolution before file access ('link following') in XBox Gaming Services allows an authorized attacker to elevate privileges locally. | 
    
    
    
        | Insertion of sensitive information into log file in Windows Failover Cluster allows an authorized attacker to disclose information locally. | 
    
    
    
        | Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network. | 
    
    
    
        | Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. | 
    
    
    
        | Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 
    
    
    
        | Insertion of sensitive information into log file in Active Directory Federation Services allows an unauthorized attacker to disclose information locally. | 
    
    
    
        | Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. | 
    
    
    
        | Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | 
    
    
    
        | Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. | 
    
    
    
        | Improper input validation in JDBC Driver for SQL Server allows an unauthorized attacker to perform spoofing over a network. |