Vulnerabilities > Microsoft > Windows 10 1607
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-07-14 | CVE-2021-33771 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products Windows Kernel Elevation of Privilege Vulnerability | 7.8 |
2021-07-02 | CVE-2021-34527 | Improper Privilege Management vulnerability in Microsoft products <p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. | 8.8 |
2021-06-08 | CVE-2021-1675 | Unspecified vulnerability in Microsoft products Windows Print Spooler Remote Code Execution Vulnerability | 7.8 |
2021-06-08 | CVE-2021-31199 | Unspecified vulnerability in Microsoft products Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability | 5.2 |
2021-06-08 | CVE-2021-31201 | Unspecified vulnerability in Microsoft products Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability | 5.2 |
2021-06-08 | CVE-2021-31956 | Integer Underflow (Wrap or Wraparound) vulnerability in Microsoft products Windows NTFS Elevation of Privilege Vulnerability | 7.8 |
2021-06-08 | CVE-2021-33742 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products Windows MSHTML Platform Remote Code Execution Vulnerability | 7.5 |
2020-08-17 | CVE-2020-1464 | Improper Verification of Cryptographic Signature vulnerability in Microsoft products A spoofing vulnerability exists when Windows incorrectly validates file signatures. | 7.8 |
2020-03-12 | CVE-2020-0787 | Link Following vulnerability in Microsoft products An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'. | 7.8 |
2019-06-12 | CVE-2019-1069 | Link Following vulnerability in Microsoft products An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations, aka 'Task Scheduler Elevation of Privilege Vulnerability'. | 7.8 |