CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
A DLL Hijacking caused by drive remapping combined with a poisoning of the activation cache in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated attacker to elevate from a medium integrity process to a high integrity process without the intervention of a UAC prompt. |
Improper verification of cryptographic signature in Windows Certificates allows an unauthorized attacker to perform spoofing over a network. |
Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally. |
Missing authentication for critical function in Windows StateRepository API allows an authorized attacker to elevate privileges locally. |
Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network. |
Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network. |
Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. |
Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. |
Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. |
Numeric truncation error in Windows Hyper-V allows an authorized attacker to elevate privileges locally. |
Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network. |
Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
Null pointer dereference in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to deny service over a network. |
Exposure of sensitive information to an unauthorized actor in Storage Port Driver allows an authorized attacker to disclose information locally. |
Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to elevate privileges locally. |
Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
Use after free in Desktop Windows Manager allows an authorized attacker to execute code locally. |
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. |