Search Results (Refine Search)
- CPE Product Version: cpe:/o:microsoft:windows_10:-::~~~~x86~
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2021-40443 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability Published: October 12, 2021; 9:15:09 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2021-38663 |
Windows exFAT File System Information Disclosure Vulnerability Published: October 12, 2021; 9:15:09 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2021-38662 |
Windows Fast FAT File System Driver Information Disclosure Vulnerability Published: October 12, 2021; 9:15:09 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2021-36970 |
Windows Print Spooler Spoofing Vulnerability Published: October 12, 2021; 9:15:09 PM -0400 |
V3.1: 8.8 HIGH V2.0: 4.3 MEDIUM |
CVE-2021-36953 |
Windows TCP/IP Denial of Service Vulnerability Published: October 12, 2021; 9:15:09 PM -0400 |
V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2021-26441 |
Storage Spaces Controller Elevation of Privilege Vulnerability Published: October 12, 2021; 9:15:09 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-12987 |
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-12986 |
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-12985 |
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-12983 |
An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-12982 |
An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-12981 |
An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-12980 |
An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2021-26414 |
Windows DCOM Server Security Feature Bypass Published: June 08, 2021; 7:15:08 PM -0400 |
V3.1: 4.8 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2021-26901 |
Windows Event Tracing Elevation of Privilege Vulnerability Published: March 11, 2021; 11:15:16 AM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-26899 |
Windows UPnP Device Host Elevation of Privilege Vulnerability Published: March 11, 2021; 11:15:16 AM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-26898 |
Windows Event Tracing Elevation of Privilege Vulnerability Published: March 11, 2021; 11:15:16 AM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-1710 |
Microsoft Windows Media Foundation Remote Code Execution Vulnerability Published: January 12, 2021; 3:15:34 PM -0500 |
V3.1: 7.8 HIGH V2.0: 6.8 MEDIUM |
CVE-2020-1598 |
<p>An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.</p> <p>The update addresses the vulnerability by correcting how the Windows UPnP service handles objects in memory.</p> Published: September 11, 2020; 1:15:22 PM -0400 |
V3.1: 6.1 MEDIUM V2.0: 4.6 MEDIUM |
CVE-2020-1596 |
<p>A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise a users's encrypted transmission channel.</p> <p>To exploit the vulnerability, an attacker would have to conduct a man-in-the-middle attack.</p> <p>The update addresses the vulnerability by correcting how TLS components use hash algorithms.</p> Published: September 11, 2020; 1:15:21 PM -0400 |
V3.1: 5.4 MEDIUM V2.0: 2.9 LOW |