Windows

1593 CVEs product

Monthly

CVE-2024-21310 HIGH PATCH This Month

Critical vulnerability in NETGEAR ProSAFE NMS300 network management system.

Microsoft Information Disclosure Windows 10 1809 Windows 10 21h2 Windows 10 22h2 +6
NVD
CVSS 3.1
7.8
EPSS
4.1%
CVE-2024-21309 HIGH PATCH This Month

Windows Kernel-Mode Driver Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity.

Integer Overflow Microsoft Information Disclosure Windows 11 21H2 Windows 11 22h2 +4
NVD
CVSS 3.1
7.8
EPSS
0.3%
CVE-2024-20700 HIGH PATCH This Month

Windows Hyper-V Remote Code Execution Vulnerability. Rated high severity (CVSS 7.5), this vulnerability is no authentication required.

Microsoft Race Condition RCE Windows 10 1809 Windows 10 21h2 +8
NVD
CVSS 3.1
7.5
EPSS
0.9%
CVE-2024-20699 MEDIUM PATCH This Month

Windows Hyper-V Denial of Service Vulnerability. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity.

Microsoft Denial Of Service Windows 10 1809 Windows 10 21h2 Windows 10 22h2 +7
NVD
CVSS 3.1
5.5
EPSS
0.2%
CVE-2024-20698 HIGH PATCH This Month

Windows Kernel Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. Epss exploitation probability 21.7%.

Integer Overflow Microsoft Information Disclosure Windows 10 1809 Windows 10 21h2 +8
NVD
CVSS 3.1
7.8
EPSS
21.7%
CVE-2024-20697 HIGH PATCH This Month

Windows libarchive Remote Code Execution Vulnerability. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. Epss exploitation probability 49.4%.

Buffer Overflow RCE Heap Overflow Microsoft Windows 11 22h2 +3
NVD GitHub
CVSS 3.1
7.3
EPSS
49.4%
CVE-2024-20696 HIGH PATCH This Month

Windows libarchive Remote Code Execution Vulnerability. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity.

Buffer Overflow RCE Heap Overflow Microsoft Windows 10 1809 +9
NVD GitHub
CVSS 3.1
7.3
EPSS
7.2%
CVE-2024-20694 MEDIUM PATCH This Month

Windows CoreMessaging Information Disclosure Vulnerability. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. This Use of Uninitialized Resource vulnerability could allow attackers to access uninitialized memory causing crashes or information disclosure.

Microsoft Information Disclosure Windows 10 1607 Windows 10 1809 Windows 10 21h2 +9
NVD
CVSS 3.1
5.5
EPSS
0.5%
CVE-2024-20691 MEDIUM PATCH Monitor

Windows Themes Information Disclosure Vulnerability. Rated medium severity (CVSS 4.7). This Out-of-bounds Read vulnerability could allow attackers to read data from memory outside the intended buffer boundaries.

Buffer Overflow Information Disclosure Microsoft Windows 10 1507 Windows 10 1607 +12
NVD
CVSS 3.1
4.7
EPSS
0.1%
CVE-2024-20690 MEDIUM PATCH This Month

Windows Nearby Sharing Spoofing Vulnerability. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Microsoft Information Disclosure Windows 10 1809 Windows 10 21h2 Windows 10 22h2 +4
NVD
CVSS 3.1
6.5
EPSS
0.3%
CVE-2024-20682 HIGH PATCH This Month

Windows Cryptographic Services Remote Code Execution Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity.

Microsoft RCE Windows 10 1507 Windows 10 1607 Windows 10 1809 +10
NVD
CVSS 3.1
7.8
EPSS
0.3%
CVE-2024-20681 HIGH PATCH This Month

Windows Subsystem for Linux Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.

Memory Corruption Use After Free Information Disclosure Microsoft Windows 10 21h2 +7
NVD
CVSS 3.1
7.8
EPSS
0.3%
CVE-2024-20680 MEDIUM PATCH This Month

Windows Message Queuing Client (MSMQC) Information Disclosure. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity.

Microsoft Information Disclosure Windows 10 1507 Windows 10 1607 Windows 10 1809 +11
NVD
CVSS 3.1
6.5
EPSS
3.4%
CVE-2024-20677 HIGH PATCH This Month

A security vulnerability exists in FBX that could lead to remote code execution. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity.

Buffer Overflow RCE Heap Overflow Microsoft 365 Apps +3
NVD
CVSS 3.1
7.8
EPSS
0.4%
CVE-2024-20674 HIGH PATCH This Month

Windows Kerberos Security Feature Bypass Vulnerability. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 16.0%.

Microsoft Authentication Bypass Windows 10 1507 Windows 10 1607 Windows 10 1809 +11
NVD
CVSS 3.1
8.8
EPSS
16.0%
CVE-2024-20663 MEDIUM PATCH This Month

Windows Message Queuing Client (MSMQC) Information Disclosure. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity.

Microsoft Information Disclosure Windows 10 1507 Windows 10 1607 Windows 10 1809 +11
NVD
CVSS 3.1
6.5
EPSS
3.7%
CVE-2024-20662 MEDIUM PATCH Monitor

Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity. This Access of Resource Using Incompatible Type (Type Confusion) vulnerability could allow attackers to execute arbitrary code by exploiting type confusion in the application.

Memory Corruption Information Disclosure Microsoft Windows Server 2008 Windows Server 2012 +5
NVD
CVSS 3.1
4.9
EPSS
0.8%
CVE-2024-20657 HIGH PATCH This Month

Windows Group Policy Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.0).

Authentication Bypass Microsoft Windows 10 1507 Windows 10 1607 Windows 10 1809 +11
NVD
CVSS 3.1
7.0
EPSS
0.3%
CVE-2024-20652 HIGH PATCH This Month

Windows HTML Platforms Security Feature Bypass Vulnerability. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required.

Microsoft Authentication Bypass Windows 10 1507 Windows 10 1607 Windows 10 1809 +11
NVD
CVSS 3.1
8.1
EPSS
3.1%
CVE-2022-38028 HIGH KEV PATCH THREAT Act Now

Windows Print Spooler allows local privilege escalation that was exploited by the Russian GRU's 'Forest Blizzard' (APT28) group using a custom tool called 'GooseEgg' for credential theft and lateral movement in government networks.

Windows
NVD
CVSS 3.1
7.8
EPSS
5.0%
CVE-2021-40444 HIGH POC KEV PATCH THREAT Act Now

Windows MSHTML component contains a remote code execution vulnerability that allows attackers to craft malicious ActiveX controls in Office documents, exploited as a zero-day in targeted attacks before the September 2021 patch.

Windows
NVD
CVSS 3.1
8.8
EPSS
94.3%
Threat
5.3
CVE-2021-1732 HIGH POC KEV PATCH THREAT Act Now

Windows Win32k contains an out-of-bounds write vulnerability enabling local privilege escalation to SYSTEM, exploited by the Bitter APT group in February 2021 for targeted espionage operations.

Windows
NVD
CVSS 3.1
7.8
EPSS
90.1%
Threat
5.1
CVE-2020-1472 MEDIUM POC KEV EUVD KEV PATCH THREAT Act Now

A privilege escalation vulnerability (CVSS 5.5). Risk factors: actively exploited (KEV-listed), EPSS 94% exploitation probability, public PoC available. Vendor patch is available.

Windows
NVD Exploit-DB
CVSS 3.1
5.5
EPSS
94.4%
Threat
4.6
CVE-2019-0859 HIGH KEV PATCH THREAT Act Now

Windows Win32k contains a use-after-free vulnerability enabling local privilege escalation to SYSTEM, exploited in the wild in April 2019 alongside CVE-2019-0803 in targeted campaigns.

Windows
NVD
CVSS 3.1
7.8
EPSS
9.9%
CVE-2019-0803 HIGH POC KEV PATCH THREAT Act Now

Windows Win32k fails to properly handle objects in memory, allowing local privilege escalation exploited in the wild in April 2019 as part of targeted APT exploit chains.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
89.8%
CVE-2018-8174 HIGH POC KEV PATCH THREAT Act Now

The Windows VBScript engine contains a remote code execution vulnerability in object handling that allows full system compromise through crafted web pages, exploited in the wild as a zero-day before the May 2018 patch.

Windows
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
94.3%
Threat
5.0
CVE-2015-2291 HIGH POC KEV PATCH THREAT Act Now

Intel Ethernet diagnostics driver IQVW32.sys/IQVW64.sys allows local users to execute arbitrary code with kernel privileges via crafted IOCTL calls, widely abused as a 'Bring Your Own Vulnerable Driver' (BYOVD) attack vector.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
5.0%
CVE-2017-0263 HIGH POC KEV PATCH THREAT Act Now

The Win32k kernel-mode driver allows local privilege escalation through a use-after-free in window object handling, chained with CVE-2017-0262 by APT28 for complete exploitation from document open to SYSTEM compromise.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
17.8%
Threat
5.1
CVE-2017-0213 HIGH POC KEV PATCH THREAT Act Now

Windows COM Aggregate Marshaler allows local privilege escalation through improper handling of COM object creation, with public exploit code making this a common tool for red teams and adversaries.

Windows
NVD Exploit-DB
CVSS 3.1
7.3
EPSS
92.7%
Threat
5.0
CVE-2017-0199 HIGH POC KEV PATCH THREAT Act Now

Microsoft Office and WordPad allow remote code execution via crafted documents that exploit Windows API handling of OLE objects, weaponized by multiple APT groups and ransomware campaigns as a primary spear-phishing delivery mechanism.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
94.3%
Threat
5.1
CVE-2017-7269 CRITICAL POC KEV PATCH THREAT Act Now

Microsoft IIS 6.0 WebDAV service contains a buffer overflow in the ScStoragePathFromUrl function that allows unauthenticated remote code execution via crafted PROPFIND requests, exploited in the wild since mid-2016.

Windows
NVD GitHub Exploit-DB
CVSS 3.1
9.8
EPSS
94.4%
Threat
5.5
CVE-2017-0144 HIGH POC KEV EUVD KEV PATCH THREAT Act Now

Windows SMBv1 server contains a remote code execution vulnerability known as 'EternalBlue' that was developed by the NSA, leaked by the Shadow Brokers, and weaponized by WannaCry and NotPetya, causing billions of dollars in global damage.

Windows
NVD Exploit-DB
CVSS 3.1
8.8
EPSS
94.3%
Threat
5.3
CVE-2017-0005 HIGH POC KEV PATCH THREAT Act Now

Windows GDI (Graphics Device Interface) allows local privilege escalation through improper memory handling, attributed to the Zirconium APT group and exploited alongside browser zero-days in targeted campaigns.

Windows
NVD
CVSS 3.1
7.8
EPSS
8.0%
Threat
5.1
CVE-2016-9192 HIGH Act Now

A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and execute an arbitrary executable file with privileges equivalent to the Microsoft Windows operating system SYSTEM...

Windows
NVD GitHub
CVSS 3.0
7.8
EPSS
31.1%
CVE-2016-7255 HIGH POC KEV PATCH THREAT Act Now

The Win32k kernel-mode driver in Windows Vista through Windows Server 2016 allows local privilege escalation, exploited alongside CVE-2016-7256 in targeted attacks attributed to the Strontium (APT28/Fancy Bear) group.

Windows
NVD GitHub Exploit-DB
CVSS 3.1
7.8
EPSS
89.4%
Threat
5.1
CVE-2016-0167 HIGH KEV PATCH THREAT Act Now

The Win32k kernel-mode driver in Windows Vista through Windows 10 allows local privilege escalation through an unspecified vulnerability in window object handling, exploited in the wild by APT groups.

Windows
NVD
CVSS 3.1
7.8
EPSS
6.1%
CVE-2016-0099 HIGH POC KEV PATCH THREAT Act Now

Windows Secondary Logon Service improperly processes request handles, allowing local users to escalate privileges to SYSTEM on Windows Vista through Windows 10 via a crafted application.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
90.4%
Threat
5.1
CVE-2016-0051 HIGH POC THREAT Act Now

Microsoft Windows WebDAV client in Vista through Windows 10 contains a local privilege escalation vulnerability. Local attackers can exploit a flaw in the WebDAV Mini-Redirector driver to elevate privileges from standard user to SYSTEM, enabling complete local system compromise.

Windows
NVD Exploit-DB
CVSS 3.0
7.8
EPSS
65.1%
CVE-2015-8651 HIGH KEV PATCH THREAT Act Now

Adobe Flash Player contains an integer overflow vulnerability that allows remote code execution, exploited in the wild in December 2015, one of the last major Flash zero-days before the industry began phasing out the plugin.

Windows
NVD
CVSS 3.1
8.8
EPSS
89.0%
CVE-2015-2387 HIGH KEV PATCH THREAT Act Now

The Adobe Type Manager Font Driver (ATMFD.DLL) in Windows contains a memory corruption vulnerability that allows local privilege escalation, exploited by the Duqu 2.0 malware in targeted attacks against diplomatic entities.

Windows
NVD
CVSS 3.1
7.8
EPSS
31.2%
CVE-2015-5119 CRITICAL POC KEV PATCH THREAT Act Now

Adobe Flash Player contains a use-after-free in the ByteArray AS3 class that allows remote code execution, infamously leaked from the Hacking Team breach in July 2015 and immediately adopted by multiple exploit kits and APT groups.

Windows
NVD GitHub Exploit-DB
CVSS 3.1
9.8
EPSS
93.2%
Threat
5.5
CVE-2015-3113 CRITICAL POC KEV PATCH THREAT Act Now

Adobe Flash Player contains a heap-based buffer overflow that allows remote code execution, exploited as a zero-day in June 2015 by APT3 (a Chinese cyber espionage group) in phishing campaigns targeting aerospace and defense organizations.

Windows
NVD GitHub Exploit-DB
CVSS 3.1
9.8
EPSS
92.4%
Threat
4.0
CVE-2015-1701 HIGH POC KEV PATCH THREAT Act Now

Win32k.sys in Windows Server 2003, Vista, and Server 2008 allows local privilege escalation through a kernel-mode vulnerability, exploited in the wild alongside browser zero-days in April 2015 as part of APT attack chains.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
90.2%
Threat
5.1
CVE-2014-6324 HIGH POC KEV PATCH THREAT Act Now

The Windows Kerberos KDC fails to properly validate PAC signatures, allowing any authenticated domain user to forge Kerberos tickets and gain domain administrator privileges. Known as MS14-068, one of the most critical Active Directory vulnerabilities ever disclosed.

Windows
NVD Exploit-DB
CVSS 3.1
8.8
EPSS
90.3%
CVE-2014-4076 HIGH POC THREAT Act Now

Microsoft Windows Server 2003 SP2 contains a local privilege escalation vulnerability via crafted IOCTL calls to tcpip.sys or tcpip6.sys drivers. Local attackers can exploit improper access control in the TCP/IP driver to gain SYSTEM privileges on the server.

Windows
NVD Exploit-DB
CVSS 2.0
7.2
EPSS
61.1%
Threat
4.9
CVE-2014-6352 HIGH POC KEV PATCH THREAT Act Now

Windows OLE improperly handles crafted OLE objects in PowerPoint, allowing remote attackers to execute arbitrary code. This is a variant of the Sandworm OLE attack discovered in October 2014 via crafted PowerPoint presentations.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
90.7%
CVE-2014-4114 HIGH POC KEV PATCH THREAT Act Now

Windows OLE improperly handles objects in Office documents, allowing remote code execution through crafted OLE objects. Known as the 'Sandworm' attack vector, exploited by Russian APT groups from June through October 2014.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
92.1%
Threat
5.1
CVE-2013-3906 HIGH POC KEV PATCH THREAT Act Now

GDI+ in Microsoft Windows and Office fails to properly handle TIFF images, allowing remote code execution through crafted documents, actively exploited in targeted attacks against Pakistani and Middle Eastern organizations.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
92.6%
Threat
5.1
CVE-2013-3660 HIGH POC KEV PATCH THREAT Act Now

The EPATHOBJ::pprFlattenRec function in Windows win32k.sys fails to properly initialize list pointers, allowing local users to gain SYSTEM privileges through kernel-mode code execution on Windows XP through Windows 8.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
69.2%
Threat
5.1
CVE-2011-4369 CRITICAL PATCH Act Now

Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader...

Windows macOS
NVD
CVSS 2.0
10.0
EPSS
18.7%
Threat
4.0
CVE-2011-2462 CRITICAL POC KEV THREAT Emergency

Adobe Reader and Acrobat contain an unspecified U3D component vulnerability causing memory corruption that allows remote code execution, exploited as a zero-day in December 2011 through crafted PDF files.

Windows macOS
NVD GitHub Exploit-DB
CVSS 3.1
9.8
EPSS
91.9%
Threat
4.0
CVE-2011-2005 HIGH POC KEV PATCH THREAT Act Now

Windows afd.sys (Ancillary Function Driver) in XP and Server 2003 improperly validates user-mode input passed to kernel mode, allowing local users to escalate privileges to SYSTEM via a crafted application.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
67.1%
CVE-2011-0611 HIGH POC KEV PATCH THREAT Act Now

Adobe Flash Player contains a type confusion vulnerability in object handling that allows remote attackers to execute arbitrary code via malicious SWF content, actively exploited in targeted attacks in April 2011.

Android Windows macOS
NVD Exploit-DB
CVSS 3.1
8.8
EPSS
93.6%
Threat
5.3
CVE-2011-0609 HIGH POC KEV THREAT Act Now

Adobe Flash Player 10.2 and earlier across all platforms contain an unspecified vulnerability allowing remote code execution, exploited in the wild via Flash content embedded in Microsoft Office documents and web pages.

Android Windows macOS
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
92.0%
CVE-2010-2743 HIGH POC Act Now

CVE-2010-2743 is a security vulnerability (CVSS 7.2) that allows local users. Risk factors: public PoC available.

Windows
NVD Exploit-DB
CVSS 2.0
7.2
EPSS
8.9%
CVE-2010-3338 HIGH POC THREAT Act Now

The Windows Task Scheduler in Vista, Server 2008, and Windows 7 contains a privilege escalation vulnerability that allows local users to gain elevated privileges through crafted applications. The scheduler improperly determines the security context for scheduled tasks, enabling attackers to run code with higher privileges than their current user context.

Windows
NVD Exploit-DB
CVSS 2.0
7.2
EPSS
63.3%
CVE-2010-4398 HIGH POC KEV PATCH THREAT Act Now

A stack-based buffer overflow in win32k.sys RtlQueryRegistryValues function allows local privilege escalation and UAC bypass on Windows XP through Windows 7 via crafted REG_BINARY registry values.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
6.4%
Threat
5.1
CVE-2010-2568 HIGH POC KEV PATCH THREAT Act Now

Windows Shell improperly handles .LNK shortcut files during icon display, allowing local or remote attackers to execute arbitrary code. This vulnerability was famously exploited by the Stuxnet worm to propagate via USB drives in 2010.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
92.1%
Threat
5.1
CVE-2010-1885 CRITICAL POC THREAT Emergency

Microsoft Windows Help and Support Center in XP and Server 2003 contains a URL validation bypass in the HCP protocol handler. The MPC::HexToNum function mishandles escape sequences, allowing attackers to bypass the trusted documents whitelist and execute arbitrary commands via crafted hcp:// URLs.

Microsoft Windows
NVD Exploit-DB
CVSS 2.0
9.3
EPSS
92.2%
Threat
5.4
CVE-2010-0232 HIGH POC KEV PATCH THREAT Act Now

The Windows kernel from NT 3.1 through Windows 7 improperly validates BIOS calls on 32-bit x86 platforms with 16-bit application support enabled, allowing local users to gain SYSTEM privileges and bypass UAC.

Windows
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
72.6%
Threat
5.1
CVE-2009-4324 HIGH POC KEV THREAT Act Now

Adobe Reader and Acrobat contain a use-after-free vulnerability in the Doc.media.newPlayer JavaScript method that was actively exploited as a zero-day in December 2009 via crafted PDF files with ZLib compressed streams.

Windows macOS
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
92.9%
Threat
5.1
CVE-2008-1084 HIGH POC THREAT Act Now

Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, through Vista SP1, and Server 2008 allows local users to execute arbitrary code via unknown vectors related to improper input validation.

Windows
NVD Exploit-DB
CVSS 2.0
7.2
EPSS
10.4%
Threat
4.9
CVE-2007-5633 HIGH POC Act Now

CVE-2007-5633 is a security vulnerability (CVSS 7.2) that allows local users. Risk factors: public PoC available.

Windows
NVD Exploit-DB
CVSS 2.0
7.2
EPSS
0.2%
Threat
4.9
EPSS 4% CVSS 7.8
HIGH PATCH This Month

Critical vulnerability in NETGEAR ProSAFE NMS300 network management system.

Microsoft Information Disclosure Windows 10 1809 +8
NVD
EPSS 0% CVSS 7.8
HIGH PATCH This Month

Windows Kernel-Mode Driver Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity.

Integer Overflow Microsoft Information Disclosure +6
NVD
EPSS 1% CVSS 7.5
HIGH PATCH This Month

Windows Hyper-V Remote Code Execution Vulnerability. Rated high severity (CVSS 7.5), this vulnerability is no authentication required.

Microsoft Race Condition RCE +10
NVD
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Windows Hyper-V Denial of Service Vulnerability. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity.

Microsoft Denial Of Service Windows 10 1809 +9
NVD
EPSS 22% CVSS 7.8
HIGH PATCH This Month

Windows Kernel Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. Epss exploitation probability 21.7%.

Integer Overflow Microsoft Information Disclosure +10
NVD
EPSS 49% CVSS 7.3
HIGH PATCH This Month

Windows libarchive Remote Code Execution Vulnerability. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity. Epss exploitation probability 49.4%.

Buffer Overflow RCE Heap Overflow +5
NVD GitHub
EPSS 7% CVSS 7.3
HIGH PATCH This Month

Windows libarchive Remote Code Execution Vulnerability. Rated high severity (CVSS 7.3), this vulnerability is low attack complexity.

Buffer Overflow RCE Heap Overflow +11
NVD GitHub
EPSS 1% CVSS 5.5
MEDIUM PATCH This Month

Windows CoreMessaging Information Disclosure Vulnerability. Rated medium severity (CVSS 5.5), this vulnerability is low attack complexity. This Use of Uninitialized Resource vulnerability could allow attackers to access uninitialized memory causing crashes or information disclosure.

Microsoft Information Disclosure Windows 10 1607 +11
NVD
EPSS 0% CVSS 4.7
MEDIUM PATCH Monitor

Windows Themes Information Disclosure Vulnerability. Rated medium severity (CVSS 4.7). This Out-of-bounds Read vulnerability could allow attackers to read data from memory outside the intended buffer boundaries.

Buffer Overflow Information Disclosure Microsoft +14
NVD
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Windows Nearby Sharing Spoofing Vulnerability. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Microsoft Information Disclosure Windows 10 1809 +6
NVD
EPSS 0% CVSS 7.8
HIGH PATCH This Month

Windows Cryptographic Services Remote Code Execution Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity.

Microsoft RCE Windows 10 1507 +12
NVD
EPSS 0% CVSS 7.8
HIGH PATCH This Month

Windows Subsystem for Linux Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. This Use After Free vulnerability could allow attackers to access freed memory to execute arbitrary code or crash the application.

Memory Corruption Use After Free Information Disclosure +9
NVD
EPSS 3% CVSS 6.5
MEDIUM PATCH This Month

Windows Message Queuing Client (MSMQC) Information Disclosure. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity.

Microsoft Information Disclosure Windows 10 1507 +13
NVD
EPSS 0% CVSS 7.8
HIGH PATCH This Month

A security vulnerability exists in FBX that could lead to remote code execution. Rated high severity (CVSS 7.8), this vulnerability is no authentication required, low attack complexity.

Buffer Overflow RCE Heap Overflow +5
NVD
EPSS 16% CVSS 8.8
HIGH PATCH This Month

Windows Kerberos Security Feature Bypass Vulnerability. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 16.0%.

Microsoft Authentication Bypass Windows 10 1507 +13
NVD
EPSS 4% CVSS 6.5
MEDIUM PATCH This Month

Windows Message Queuing Client (MSMQC) Information Disclosure. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, low attack complexity.

Microsoft Information Disclosure Windows 10 1507 +13
NVD
EPSS 1% CVSS 4.9
MEDIUM PATCH Monitor

Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability. Rated medium severity (CVSS 4.9), this vulnerability is remotely exploitable, low attack complexity. This Access of Resource Using Incompatible Type (Type Confusion) vulnerability could allow attackers to execute arbitrary code by exploiting type confusion in the application.

Memory Corruption Information Disclosure Microsoft +7
NVD
EPSS 0% CVSS 7.0
HIGH PATCH This Month

Windows Group Policy Elevation of Privilege Vulnerability. Rated high severity (CVSS 7.0).

Authentication Bypass Microsoft Windows 10 1507 +13
NVD
EPSS 3% CVSS 8.1
HIGH PATCH This Month

Windows HTML Platforms Security Feature Bypass Vulnerability. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, no authentication required.

Microsoft Authentication Bypass Windows 10 1507 +13
NVD
EPSS 5% CVSS 7.8
HIGH KEV PATCH THREAT Act Now

Windows Print Spooler allows local privilege escalation that was exploited by the Russian GRU's 'Forest Blizzard' (APT28) group using a custom tool called 'GooseEgg' for credential theft and lateral movement in government networks.

Windows
NVD
EPSS 94% 5.3 CVSS 8.8
HIGH POC KEV PATCH THREAT Act Now

Windows MSHTML component contains a remote code execution vulnerability that allows attackers to craft malicious ActiveX controls in Office documents, exploited as a zero-day in targeted attacks before the September 2021 patch.

Windows
NVD
EPSS 90% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Windows Win32k contains an out-of-bounds write vulnerability enabling local privilege escalation to SYSTEM, exploited by the Bitter APT group in February 2021 for targeted espionage operations.

Windows
NVD
EPSS 94% 4.6 CVSS 5.5
MEDIUM POC KEV EUVD KEV PATCH THREAT Act Now

A privilege escalation vulnerability (CVSS 5.5). Risk factors: actively exploited (KEV-listed), EPSS 94% exploitation probability, public PoC available. Vendor patch is available.

Windows
NVD Exploit-DB
EPSS 10% CVSS 7.8
HIGH KEV PATCH THREAT Act Now

Windows Win32k contains a use-after-free vulnerability enabling local privilege escalation to SYSTEM, exploited in the wild in April 2019 alongside CVE-2019-0803 in targeted campaigns.

Windows
NVD
EPSS 90% CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Windows Win32k fails to properly handle objects in memory, allowing local privilege escalation exploited in the wild in April 2019 as part of targeted APT exploit chains.

Windows
NVD Exploit-DB
EPSS 94% 5.0 CVSS 7.5
HIGH POC KEV PATCH THREAT Act Now

The Windows VBScript engine contains a remote code execution vulnerability in object handling that allows full system compromise through crafted web pages, exploited in the wild as a zero-day before the May 2018 patch.

Windows
NVD Exploit-DB
EPSS 5% CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Intel Ethernet diagnostics driver IQVW32.sys/IQVW64.sys allows local users to execute arbitrary code with kernel privileges via crafted IOCTL calls, widely abused as a 'Bring Your Own Vulnerable Driver' (BYOVD) attack vector.

Windows
NVD Exploit-DB
EPSS 18% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

The Win32k kernel-mode driver allows local privilege escalation through a use-after-free in window object handling, chained with CVE-2017-0262 by APT28 for complete exploitation from document open to SYSTEM compromise.

Windows
NVD Exploit-DB
EPSS 93% 5.0 CVSS 7.3
HIGH POC KEV PATCH THREAT Act Now

Windows COM Aggregate Marshaler allows local privilege escalation through improper handling of COM object creation, with public exploit code making this a common tool for red teams and adversaries.

Windows
NVD Exploit-DB
EPSS 94% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Microsoft Office and WordPad allow remote code execution via crafted documents that exploit Windows API handling of OLE objects, weaponized by multiple APT groups and ransomware campaigns as a primary spear-phishing delivery mechanism.

Windows
NVD Exploit-DB
EPSS 94% 5.5 CVSS 9.8
CRITICAL POC KEV PATCH THREAT Act Now

Microsoft IIS 6.0 WebDAV service contains a buffer overflow in the ScStoragePathFromUrl function that allows unauthenticated remote code execution via crafted PROPFIND requests, exploited in the wild since mid-2016.

Windows
NVD GitHub Exploit-DB
EPSS 94% 5.3 CVSS 8.8
HIGH POC KEV EUVD KEV PATCH THREAT Act Now

Windows SMBv1 server contains a remote code execution vulnerability known as 'EternalBlue' that was developed by the NSA, leaked by the Shadow Brokers, and weaponized by WannaCry and NotPetya, causing billions of dollars in global damage.

Windows
NVD Exploit-DB
EPSS 8% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Windows GDI (Graphics Device Interface) allows local privilege escalation through improper memory handling, attributed to the Zirconium APT group and exploited alongside browser zero-days in targeted campaigns.

Windows
NVD
EPSS 31% CVSS 7.8
HIGH Act Now

A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and execute an arbitrary executable file with privileges equivalent to the Microsoft Windows operating system SYSTEM...

Windows
NVD GitHub
EPSS 89% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

The Win32k kernel-mode driver in Windows Vista through Windows Server 2016 allows local privilege escalation, exploited alongside CVE-2016-7256 in targeted attacks attributed to the Strontium (APT28/Fancy Bear) group.

Windows
NVD GitHub Exploit-DB
EPSS 6% CVSS 7.8
HIGH KEV PATCH THREAT Act Now

The Win32k kernel-mode driver in Windows Vista through Windows 10 allows local privilege escalation through an unspecified vulnerability in window object handling, exploited in the wild by APT groups.

Windows
NVD
EPSS 90% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Windows Secondary Logon Service improperly processes request handles, allowing local users to escalate privileges to SYSTEM on Windows Vista through Windows 10 via a crafted application.

Windows
NVD Exploit-DB
EPSS 65% CVSS 7.8
HIGH POC THREAT Act Now

Microsoft Windows WebDAV client in Vista through Windows 10 contains a local privilege escalation vulnerability. Local attackers can exploit a flaw in the WebDAV Mini-Redirector driver to elevate privileges from standard user to SYSTEM, enabling complete local system compromise.

Windows
NVD Exploit-DB
EPSS 89% CVSS 8.8
HIGH KEV PATCH THREAT Act Now

Adobe Flash Player contains an integer overflow vulnerability that allows remote code execution, exploited in the wild in December 2015, one of the last major Flash zero-days before the industry began phasing out the plugin.

Windows
NVD
EPSS 31% CVSS 7.8
HIGH KEV PATCH THREAT Act Now

The Adobe Type Manager Font Driver (ATMFD.DLL) in Windows contains a memory corruption vulnerability that allows local privilege escalation, exploited by the Duqu 2.0 malware in targeted attacks against diplomatic entities.

Windows
NVD
EPSS 93% 5.5 CVSS 9.8
CRITICAL POC KEV PATCH THREAT Act Now

Adobe Flash Player contains a use-after-free in the ByteArray AS3 class that allows remote code execution, infamously leaked from the Hacking Team breach in July 2015 and immediately adopted by multiple exploit kits and APT groups.

Windows
NVD GitHub Exploit-DB
EPSS 92% 4.0 CVSS 9.8
CRITICAL POC KEV PATCH THREAT Act Now

Adobe Flash Player contains a heap-based buffer overflow that allows remote code execution, exploited as a zero-day in June 2015 by APT3 (a Chinese cyber espionage group) in phishing campaigns targeting aerospace and defense organizations.

Windows
NVD GitHub Exploit-DB
EPSS 90% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Win32k.sys in Windows Server 2003, Vista, and Server 2008 allows local privilege escalation through a kernel-mode vulnerability, exploited in the wild alongside browser zero-days in April 2015 as part of APT attack chains.

Windows
NVD Exploit-DB
EPSS 90% CVSS 8.8
HIGH POC KEV PATCH THREAT Act Now

The Windows Kerberos KDC fails to properly validate PAC signatures, allowing any authenticated domain user to forge Kerberos tickets and gain domain administrator privileges. Known as MS14-068, one of the most critical Active Directory vulnerabilities ever disclosed.

Windows
NVD Exploit-DB
EPSS 61% 4.9 CVSS 7.2
HIGH POC THREAT Act Now

Microsoft Windows Server 2003 SP2 contains a local privilege escalation vulnerability via crafted IOCTL calls to tcpip.sys or tcpip6.sys drivers. Local attackers can exploit improper access control in the TCP/IP driver to gain SYSTEM privileges on the server.

Windows
NVD Exploit-DB
EPSS 91% CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Windows OLE improperly handles crafted OLE objects in PowerPoint, allowing remote attackers to execute arbitrary code. This is a variant of the Sandworm OLE attack discovered in October 2014 via crafted PowerPoint presentations.

Windows
NVD Exploit-DB
EPSS 92% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Windows OLE improperly handles objects in Office documents, allowing remote code execution through crafted OLE objects. Known as the 'Sandworm' attack vector, exploited by Russian APT groups from June through October 2014.

Windows
NVD Exploit-DB
EPSS 93% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

GDI+ in Microsoft Windows and Office fails to properly handle TIFF images, allowing remote code execution through crafted documents, actively exploited in targeted attacks against Pakistani and Middle Eastern organizations.

Windows
NVD Exploit-DB
EPSS 69% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

The EPATHOBJ::pprFlattenRec function in Windows win32k.sys fails to properly initialize list pointers, allowing local users to gain SYSTEM privileges through kernel-mode code execution on Windows XP through Windows 8.

Windows
NVD Exploit-DB
EPSS 19% 4.0 CVSS 10.0
CRITICAL PATCH Act Now

Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader...

Windows macOS
NVD
EPSS 92% 4.0 CVSS 9.8
CRITICAL POC KEV THREAT Emergency

Adobe Reader and Acrobat contain an unspecified U3D component vulnerability causing memory corruption that allows remote code execution, exploited as a zero-day in December 2011 through crafted PDF files.

Windows macOS
NVD GitHub Exploit-DB
EPSS 67% CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Windows afd.sys (Ancillary Function Driver) in XP and Server 2003 improperly validates user-mode input passed to kernel mode, allowing local users to escalate privileges to SYSTEM via a crafted application.

Windows
NVD Exploit-DB
EPSS 94% 5.3 CVSS 8.8
HIGH POC KEV PATCH THREAT Act Now

Adobe Flash Player contains a type confusion vulnerability in object handling that allows remote attackers to execute arbitrary code via malicious SWF content, actively exploited in targeted attacks in April 2011.

Android Windows macOS
NVD Exploit-DB
EPSS 92% CVSS 7.8
HIGH POC KEV THREAT Act Now

Adobe Flash Player 10.2 and earlier across all platforms contain an unspecified vulnerability allowing remote code execution, exploited in the wild via Flash content embedded in Microsoft Office documents and web pages.

Android Windows macOS
NVD Exploit-DB
EPSS 9% CVSS 7.2
HIGH POC Act Now

CVE-2010-2743 is a security vulnerability (CVSS 7.2) that allows local users. Risk factors: public PoC available.

Windows
NVD Exploit-DB
EPSS 63% CVSS 7.2
HIGH POC THREAT Act Now

The Windows Task Scheduler in Vista, Server 2008, and Windows 7 contains a privilege escalation vulnerability that allows local users to gain elevated privileges through crafted applications. The scheduler improperly determines the security context for scheduled tasks, enabling attackers to run code with higher privileges than their current user context.

Windows
NVD Exploit-DB
EPSS 6% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

A stack-based buffer overflow in win32k.sys RtlQueryRegistryValues function allows local privilege escalation and UAC bypass on Windows XP through Windows 7 via crafted REG_BINARY registry values.

Windows
NVD Exploit-DB
EPSS 92% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

Windows Shell improperly handles .LNK shortcut files during icon display, allowing local or remote attackers to execute arbitrary code. This vulnerability was famously exploited by the Stuxnet worm to propagate via USB drives in 2010.

Windows
NVD Exploit-DB
EPSS 92% 5.4 CVSS 9.3
CRITICAL POC THREAT Emergency

Microsoft Windows Help and Support Center in XP and Server 2003 contains a URL validation bypass in the HCP protocol handler. The MPC::HexToNum function mishandles escape sequences, allowing attackers to bypass the trusted documents whitelist and execute arbitrary commands via crafted hcp:// URLs.

Microsoft Windows
NVD Exploit-DB
EPSS 73% 5.1 CVSS 7.8
HIGH POC KEV PATCH THREAT Act Now

The Windows kernel from NT 3.1 through Windows 7 improperly validates BIOS calls on 32-bit x86 platforms with 16-bit application support enabled, allowing local users to gain SYSTEM privileges and bypass UAC.

Windows
NVD Exploit-DB
EPSS 93% 5.1 CVSS 7.8
HIGH POC KEV THREAT Act Now

Adobe Reader and Acrobat contain a use-after-free vulnerability in the Doc.media.newPlayer JavaScript method that was actively exploited as a zero-day in December 2009 via crafted PDF files with ZLib compressed streams.

Windows macOS
NVD Exploit-DB
EPSS 10% 4.9 CVSS 7.2
HIGH POC THREAT Act Now

Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, through Vista SP1, and Server 2008 allows local users to execute arbitrary code via unknown vectors related to improper input validation.

Windows
NVD Exploit-DB
EPSS 0% 4.9 CVSS 7.2
HIGH POC Act Now

CVE-2007-5633 is a security vulnerability (CVSS 7.2) that allows local users. Risk factors: public PoC available.

Windows
NVD Exploit-DB
Prev Page 18 of 18

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy