U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CPE Product Version: cpe:/o:microsoft:windows_10:-::~~~~x86~
There are 295 matching records.
Displaying matches 201 through 220.
Vuln ID Summary CVSS Severity
CVE-2021-40443

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Published: October 12, 2021; 9:15:09 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-38663

Windows exFAT File System Information Disclosure Vulnerability

Published: October 12, 2021; 9:15:09 PM -0400
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2021-38662

Windows Fast FAT File System Driver Information Disclosure Vulnerability

Published: October 12, 2021; 9:15:09 PM -0400
V3.1: 5.5 MEDIUM
V2.0: 4.9 MEDIUM
CVE-2021-36970

Windows Print Spooler Spoofing Vulnerability

Published: October 12, 2021; 9:15:09 PM -0400
V3.1: 8.8 HIGH
V2.0: 4.3 MEDIUM
CVE-2021-36953

Windows TCP/IP Denial of Service Vulnerability

Published: October 12, 2021; 9:15:09 PM -0400
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2021-26441

Storage Spaces Controller Elevation of Privilege Vulnerability

Published: October 12, 2021; 9:15:09 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-12987

A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-12986

An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-12985

An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-12983

An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-12982

An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-12981

An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-12980

An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26414

Windows DCOM Server Security Feature Bypass

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 4.8 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2021-26901

Windows Event Tracing Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2021-26899

Windows UPnP Device Host Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2021-26898

Windows Event Tracing Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2021-1710

Microsoft Windows Media Foundation Remote Code Execution Vulnerability

Published: January 12, 2021; 3:15:34 PM -0500
V3.1: 7.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2020-1598

<p>An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.</p> <p>The update addresses the vulnerability by correcting how the Windows UPnP service handles objects in memory.</p>

Published: September 11, 2020; 1:15:22 PM -0400
V3.1: 6.1 MEDIUM
V2.0: 4.6 MEDIUM
CVE-2020-1596

<p>A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise a users's encrypted transmission channel.</p> <p>To exploit the vulnerability, an attacker would have to conduct a man-in-the-middle attack.</p> <p>The update addresses the vulnerability by correcting how TLS components use hash algorithms.</p>

Published: September 11, 2020; 1:15:21 PM -0400
V3.1: 5.4 MEDIUM
V2.0: 2.9 LOW