2021-02-25
|
CVE-2021-1732
|
Windows Win32k Elevation of Privilege Vulnerability
|
Windows_10_1803, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_server_1909, Windows_server_2004, Windows_server_2019, Windows_server_20h2
|
7.8
|
|
|
2021-10-13
|
CVE-2021-40449
|
Win32k Elevation of Privilege Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_11, Windows_11_21h2, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
7.8
|
|
|
2021-11-10
|
CVE-2021-41379
|
Windows Installer Elevation of Privilege Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
5.5
|
|
|
2021-08-12
|
CVE-2021-34486
|
Windows Event Tracing Elevation of Privilege Vulnerability
|
Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_server_2004, Windows_server_2019, Windows_server_20h2
|
7.8
|
|
|
2021-05-11
|
CVE-2021-31166
|
HTTP Protocol Stack Remote Code Execution Vulnerability
|
Windows_10_2004, Windows_10_20h2, Windows_server_2004, Windows_server_20h2
|
9.8
|
|
|
2021-08-12
|
CVE-2021-34484
|
Windows User Profile Service Elevation of Privilege Vulnerability
|
Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_20h2
|
7.8
|
|
|
2021-11-10
|
CVE-2021-42278
|
Active Directory Domain Services Elevation of Privilege Vulnerability
|
Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
7.5
|
|
|
2021-10-13
|
CVE-2021-40450
|
Win32k Elevation of Privilege Vulnerability
|
Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_server_2004, Windows_server_2019, Windows_server_2022, Windows_server_20h2
|
7.8
|
|
|
2021-10-13
|
CVE-2021-41357
|
Win32k Elevation of Privilege Vulnerability
|
Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_server_2004, Windows_server_2022, Windows_server_20h2
|
7.8
|
|
|
2020-08-17
|
CVE-2020-1472
|
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.
To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access.
Microsoft...
|
Ubuntu_linux, Debian_linux, Fedora, Windows_server_1903, Windows_server_1909, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_20h2, Leap, Zfs_storage_appliance_kit, Samba, Directory_server
|
5.5
|
|
|