Search Results (Refine Search)
- CPE Product Version: cpe:/o:microsoft:windows_10:-::~~~~x64~
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2020-12987 |
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-12986 |
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-12985 |
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-12983 |
An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-12982 |
An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-12981 |
An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-12980 |
An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service. Published: June 11, 2021; 6:15:11 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2021-26414 |
Windows DCOM Server Security Feature Bypass Published: June 08, 2021; 7:15:08 PM -0400 |
V3.1: 4.8 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2021-28476 |
Windows Hyper-V Remote Code Execution Vulnerability Published: May 11, 2021; 3:15:09 PM -0400 |
V3.1: 9.9 CRITICAL V2.0: 6.5 MEDIUM |
CVE-2021-28444 |
Windows Hyper-V Security Feature Bypass Vulnerability Published: April 13, 2021; 4:15:19 PM -0400 |
V3.1: 5.7 MEDIUM V2.0: 4.0 MEDIUM |
CVE-2021-26901 |
Windows Event Tracing Elevation of Privilege Vulnerability Published: March 11, 2021; 11:15:16 AM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-26899 |
Windows UPnP Device Host Elevation of Privilege Vulnerability Published: March 11, 2021; 11:15:16 AM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-26898 |
Windows Event Tracing Elevation of Privilege Vulnerability Published: March 11, 2021; 11:15:16 AM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2021-26879 |
Windows Network Address Translation (NAT) Denial of Service Vulnerability Published: March 11, 2021; 11:15:15 AM -0500 |
V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2021-24076 |
Microsoft Windows VMSwitch Information Disclosure Vulnerability Published: February 25, 2021; 6:15:14 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2021-1710 |
Microsoft Windows Media Foundation Remote Code Execution Vulnerability Published: January 12, 2021; 3:15:34 PM -0500 |
V3.1: 7.8 HIGH V2.0: 6.8 MEDIUM |
CVE-2021-1704 |
Windows Hyper-V Elevation of Privilege Vulnerability Published: January 12, 2021; 3:15:34 PM -0500 |
V3.1: 7.3 HIGH V2.0: 7.2 HIGH |
CVE-2021-1692 |
Windows Hyper-V Denial of Service Vulnerability Published: January 12, 2021; 3:15:33 PM -0500 |
V3.1: 7.7 HIGH V2.0: 4.0 MEDIUM |
CVE-2020-16891 |
<p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.</p> <p>An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.</p> <p>The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.</p> Published: October 16, 2020; 7:15:13 PM -0400 |
V3.1: 8.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-1598 |
<p>An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.</p> <p>The update addresses the vulnerability by correcting how the Windows UPnP service handles objects in memory.</p> Published: September 11, 2020; 1:15:22 PM -0400 |
V3.1: 6.1 MEDIUM V2.0: 4.6 MEDIUM |