CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Heap-based buffer overflow in Windows DWM allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. |
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. |
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. |
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. |
Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to deny service locally. |
Improper access control in Software Protection Platform (SPP) allows an authorized attacker to elevate privileges locally. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Data Sharing Service Client allows an unauthorized attacker to perform spoofing locally. |
Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Remote Desktop Services allows an authorized attacker to elevate privileges locally. |
Use of uninitialized resource in Windows Management Services allows an authorized attacker to disclose information locally. |
Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
Use after free in Connected Devices Platform Service (Cdpsvc) allows an unauthorized attacker to execute code over a network. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally. |
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. |
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. |
Dimension versions 4.1.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Dimension versions 4.1.4 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
Dimension versions 4.1.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |