Filtered by vendor Microsoft Subscriptions
Filtered by product Windows 10 Subscriptions
Total 4200 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-59033 1 Microsoft 7 Windows, Windows 10, Windows 11 and 4 more 2025-10-30 7.4 High
The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. On systems that do not have hypervisor-protected code integrity (HVCI) enabled, entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate’s TBS hash along with a 'FileAttribRef' qualifier (such as file name or version) will not be blocked. This vulnerability affects any Windows system that does not have HVCI enabled or supported (HVCI is available in Windows 10, Windows 11, and Windows Server 2016 and later). NOTE: The vendor states that the driver blocklist is intended for use with HVCI, while systems without HVCI should use App Control, and any custom blocklist entries require a granular approach for proper enforcement.
CVE-2019-1069 1 Microsoft 12 Windows 10, Windows 10 1507, Windows 10 1607 and 9 more 2025-10-29 7.8 High
An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.
CVE-2020-0878 1 Microsoft 19 Chakracore, Edge, Internet Explorer and 16 more 2025-10-29 4.2 Medium
<p>A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft browsers, and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically via an enticement in email or instant message, or by getting them to open an email attachment.</p> <p>The security update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.</p>
CVE-2020-17087 1 Microsoft 24 Windows 10, Windows 10 1507, Windows 10 1607 and 21 more 2025-10-29 7.8 High
Windows Kernel Local Elevation of Privilege Vulnerability
CVE-2020-1147 2 Microsoft, Redhat 18 .net Core, .net Framework, Sharepoint Enterprise Server and 15 more 2025-10-29 7.8 High
A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.
CVE-2020-1464 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2025-10-29 7.8 High
A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded. The update addresses the vulnerability by correcting how Windows validates file signatures.
CVE-2018-0824 1 Microsoft 14 Windows 10, Windows 10 1507, Windows 10 1607 and 11 more 2025-10-28 7.5 High
A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
CVE-2025-59280 1 Microsoft 19 Windows, Windows 10, Windows 10 1507 and 16 more 2025-10-27 3.1 Low
Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network.
CVE-2025-59254 1 Microsoft 18 Windows, Windows 10, Windows 10 1507 and 15 more 2025-10-27 7.8 High
Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
CVE-2025-53139 1 Microsoft 11 Windows, Windows 10, Windows 10 21h2 and 8 more 2025-10-27 7.7 High
Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally.
CVE-2025-59502 1 Microsoft 15 Remote, Windows, Windows 10 and 12 more 2025-10-27 7.5 High
Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.
CVE-2025-55332 1 Microsoft 17 Bitlocker, Server, Windows and 14 more 2025-10-27 6.1 Medium
Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
CVE-2025-53150 1 Microsoft 15 Windows, Windows 10, Windows 10 1809 and 12 more 2025-10-27 7.8 High
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
CVE-2025-53768 1 Microsoft 13 Windows, Windows 10, Windows 10 1507 and 10 more 2025-10-27 7.8 High
Use after free in Xbox allows an authorized attacker to elevate privileges locally.
CVE-2025-55679 1 Microsoft 15 Windows, Windows 10, Windows 10 1809 and 12 more 2025-10-27 5.1 Medium
Improper input validation in Windows Kernel allows an unauthorized attacker to disclose information locally.
CVE-2025-55326 1 Microsoft 14 Windows, Windows 10, Windows 10 1809 and 11 more 2025-10-27 7.5 High
Use after free in Connected Devices Platform Service (Cdpsvc) allows an unauthorized attacker to execute code over a network.
CVE-2025-55331 1 Microsoft 13 Windows, Windows 10, Windows 10 21h2 and 10 more 2025-10-27 7 High
Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.
CVE-2025-55328 1 Microsoft 21 Hyper-v, Server, Windows and 18 more 2025-10-27 7.8 High
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.
CVE-2025-50175 1 Microsoft 16 Windows, Windows 10, Windows 10 1809 and 13 more 2025-10-27 7.8 High
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
CVE-2025-50152 1 Microsoft 18 Windows, Windows 10, Windows 10 1507 and 15 more 2025-10-27 7.8 High
Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally.