Vulnerabilities > Microsoft > High

DATE CVE VULNERABILITY TITLE RISK
2019-09-11 CVE-2019-1269 Unspecified vulnerability in Microsoft products
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system, aka 'Windows ALPC Elevation of Privilege Vulnerability'.
local
low complexity
microsoft
7.8
2019-09-11 CVE-2019-1268 Unspecified vulnerability in Microsoft products
An elevation of privilege exists when Winlogon does not properly handle file path information, aka 'Winlogon Elevation of Privilege Vulnerability'.
local
low complexity
microsoft
7.8
2019-09-11 CVE-2019-1267 Link Following vulnerability in Microsoft products
An elevation of privilege vulnerability exists in Microsoft Compatibility Appraiser where a configuration file, with local privileges, is vulnerable to symbolic link and hard link attacks, aka 'Microsoft Compatibility Appraiser Elevation of Privilege Vulnerability'.
local
low complexity
microsoft CWE-59
7.8
2019-09-11 CVE-2019-1265 Unspecified vulnerability in Microsoft Yammer
A security feature bypass vulnerability exists when Microsoft Yammer App for Android fails to apply the correct Intune MAM Policy.This could allow an attacker to perform functions that are restricted by Intune Policy.The security update addresses the vulnerability by correcting the way the policy is applied to Yammer App., aka 'Microsoft Yammer Security Feature Bypass Vulnerability'.
network
low complexity
microsoft
7.5
2019-09-11 CVE-2019-1264 Improper Input Validation vulnerability in Microsoft Office, Office 365 Proplus and Project
A security feature bypass vulnerability exists when Microsoft Office improperly handles input, aka 'Microsoft Office Security Feature Bypass Vulnerability'.
local
low complexity
microsoft CWE-20
7.8
2019-09-11 CVE-2019-1261 Cross-Site Request Forgery (CSRF) vulnerability in Microsoft products
A spoofing vulnerability exists in Microsoft SharePoint when it improperly handles requests to authorize applications, resulting in cross-site request forgery (CSRF).To exploit this vulnerability, an attacker would need to create a page specifically designed to cause a cross-site request, aka 'Microsoft SharePoint Spoofing Vulnerability'.
network
low complexity
microsoft CWE-352
8.8
2019-09-11 CVE-2019-1259 Cross-Site Request Forgery (CSRF) vulnerability in Microsoft Sharepoint Foundation 2013
A spoofing vulnerability exists in Microsoft SharePoint when it improperly handles requests to authorize applications, resulting in cross-site request forgery (CSRF).To exploit this vulnerability, an attacker would need to create a page specifically designed to cause a cross-site request, aka 'Microsoft SharePoint Spoofing Vulnerability'.
network
low complexity
microsoft CWE-352
8.8
2019-09-11 CVE-2019-1257 Improper Input Validation vulnerability in Microsoft products
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'.
network
low complexity
microsoft CWE-20
8.8
2019-09-11 CVE-2019-1256 Unspecified vulnerability in Microsoft products
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
local
low complexity
microsoft
7.8
2019-09-11 CVE-2019-1253 Unspecified vulnerability in Microsoft products
An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'.
local
low complexity
microsoft
7.8