CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network. |
Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally. |
Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally. |
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network. |
Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. |
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. |
Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network. |
Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network. |
Windows Wi-Fi Driver Remote Code Execution Vulnerability |
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |