U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CPE Product Version: cpe:/o:microsoft:windows_10:-::~~~~x64~
There are 345 matching records.
Displaying matches 221 through 240.
Vuln ID Summary CVSS Severity
CVE-2020-12987

A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-12986

An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-12985

An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-12983

An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-12982

An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-12981

An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-12980

An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Published: June 11, 2021; 6:15:11 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-26414

Windows DCOM Server Security Feature Bypass

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 4.8 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2021-28476

Windows Hyper-V Remote Code Execution Vulnerability

Published: May 11, 2021; 3:15:09 PM -0400
V3.1: 9.9 CRITICAL
V2.0: 6.5 MEDIUM
CVE-2021-28444

Windows Hyper-V Security Feature Bypass Vulnerability

Published: April 13, 2021; 4:15:19 PM -0400
V3.1: 5.7 MEDIUM
V2.0: 4.0 MEDIUM
CVE-2021-26901

Windows Event Tracing Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2021-26899

Windows UPnP Device Host Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2021-26898

Windows Event Tracing Elevation of Privilege Vulnerability

Published: March 11, 2021; 11:15:16 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2021-26879

Windows Network Address Translation (NAT) Denial of Service Vulnerability

Published: March 11, 2021; 11:15:15 AM -0500
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2021-24076

Microsoft Windows VMSwitch Information Disclosure Vulnerability

Published: February 25, 2021; 6:15:14 PM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2021-1710

Microsoft Windows Media Foundation Remote Code Execution Vulnerability

Published: January 12, 2021; 3:15:34 PM -0500
V3.1: 7.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-1704

Windows Hyper-V Elevation of Privilege Vulnerability

Published: January 12, 2021; 3:15:34 PM -0500
V3.1: 7.3 HIGH
V2.0: 7.2 HIGH
CVE-2021-1692

Windows Hyper-V Denial of Service Vulnerability

Published: January 12, 2021; 3:15:33 PM -0500
V3.1: 7.7 HIGH
V2.0: 4.0 MEDIUM
CVE-2020-16891

<p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.</p> <p>An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.</p> <p>The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.</p>

Published: October 16, 2020; 7:15:13 PM -0400
V3.1: 8.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-1598

<p>An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.</p> <p>The update addresses the vulnerability by correcting how the Windows UPnP service handles objects in memory.</p>

Published: September 11, 2020; 1:15:22 PM -0400
V3.1: 6.1 MEDIUM
V2.0: 4.6 MEDIUM