Vulnerabilities > Microsoft > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-02-09 | CVE-2021-21118 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Insufficient data validation in V8 in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | 8.8 |
2020-12-22 | CVE-2020-35608 | Injection vulnerability in Microsoft Azure Sphere 20.07 A code execution vulnerability exists in the normal world’s signed code execution functionality of Microsoft Azure Sphere 20.07. | 7.8 |
2020-12-08 | CVE-2020-26233 | Unspecified vulnerability in Microsoft GIT Credential Manager Core Git Credential Manager Core (GCM Core) is a secure Git credential helper built on .NET Core that runs on Windows and macOS. | 7.3 |
2020-11-03 | CVE-2020-16009 | Type Confusion vulnerability in multiple products Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2020-08-17 | CVE-2020-1597 | A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. | 7.5 |
2020-08-17 | CVE-2020-1587 | Unspecified vulnerability in Microsoft products An elevation of privilege vulnerability exists when the Windows Ancillary Function Driver for WinSock improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. | 7.8 |
2020-08-17 | CVE-2020-1585 | Unspecified vulnerability in Microsoft Windows 10 A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. | 8.8 |
2020-08-17 | CVE-2020-1581 | Unspecified vulnerability in Microsoft 365 Apps and Office An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) components handle objects in memory. | 7.8 |
2020-08-17 | CVE-2020-1579 | Unspecified vulnerability in Microsoft products An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. | 7.8 |
2020-08-17 | CVE-2020-1570 | Out-of-bounds Write vulnerability in Microsoft Internet Explorer 11/9 A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. | 7.5 |