Vulnerabilities > Microsoft > Windows 8 1

DATE CVE VULNERABILITY TITLE RISK
2020-11-11 CVE-2020-17001 Unspecified vulnerability in Microsoft products
Windows Print Spooler Elevation of Privilege Vulnerability
local
low complexity
microsoft
7.8
2020-11-11 CVE-2020-17000 Unspecified vulnerability in Microsoft products
Remote Desktop Protocol Client Information Disclosure Vulnerability
local
low complexity
microsoft
5.5
2020-11-11 CVE-2020-16997 Unspecified vulnerability in Microsoft products
Remote Desktop Protocol Server Information Disclosure Vulnerability
network
low complexity
microsoft
7.7
2020-11-11 CVE-2020-1599 Unspecified vulnerability in Microsoft products
Windows Spoofing Vulnerability
local
low complexity
microsoft
5.5
2020-10-16 CVE-2020-16949 Memory Leak vulnerability in Microsoft products
<p>A denial of service vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory.
local
high complexity
microsoft CWE-401
4.7
2020-10-16 CVE-2020-16940 Improper Privilege Management vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles junction points.
local
low complexity
microsoft CWE-269
7.8
2020-10-16 CVE-2020-16939 Link Following vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists when Group Policy improperly checks access.
local
low complexity
microsoft CWE-59
7.8
2020-10-16 CVE-2020-16935 Unspecified vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists when Windows improperly handles COM object creation.
local
low complexity
microsoft
7.8
2020-10-16 CVE-2020-16933 Unspecified vulnerability in Microsoft products
<p>A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files.
local
high complexity
microsoft
7.0
2020-10-16 CVE-2020-16927 Unspecified vulnerability in Microsoft products
<p>A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests.
network
low complexity
microsoft
7.5