| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Windows Group Policy Elevation of Privilege Vulnerability |
| Windows Boot Manager Security Feature Bypass Vulnerability |
| Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability |
| Windows Kernel Information Disclosure Vulnerability |
| Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability |
| Windows ALPC Elevation of Privilege Vulnerability |
| Windows Common Log File System Driver Information Disclosure Vulnerability |
| Windows Installer Elevation of Privilege Vulnerability |
| Windows Fast FAT File System Driver Elevation of Privilege Vulnerability |
| Windows Fax and Scan Service Elevation of Privilege Vulnerability |
| Windows HTML Platforms Security Feature Bypass Vulnerability |
| Windows PDEV Elevation of Privilege Vulnerability |
| Windows NT OS Kernel Elevation of Privilege Vulnerability |
| Windows Inking COM Elevation of Privilege Vulnerability |
| Remote Desktop Client Remote Code Execution Vulnerability |
| An elevation of privilege vulnerability exists when the Windows Shell fails to validate folder shortcuts. An attacker who successfully exploited the vulnerability could elevate privileges by escaping a sandbox.
To exploit this vulnerability, an attacker would require unprivileged execution on the victim system.
The security update addresses the vulnerability by correctly validating folder shortcuts. |
| An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. |
| An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. |
| An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. |
| An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.
The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. |