Microsoft DWM Core Library Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.
Windows Graphics Component Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
NT OS Kernel Elevation of Privilege Vulnerability
Windows WalletService Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows GDI Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Windows Update Stack Setup Elevation of Privilege Vulnerability
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
The Samsung Universal Print Driver for Windows is potentially vulnerable to escalation of privilege allowing the creation of a reverse shell in the tool. This is only applicable for products in the application released or manufactured before 2018.
Windows WalletService Elevation of Privilege Vulnerability
Windows WalletService Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows WalletService Elevation of Privilege Vulnerability
Windows Multipoint Management Elevation of Privilege Vulnerability
Windows WLAN Service Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Windows InstallService Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Active Template Library Elevation of Privilege Vulnerability
Windows Hyper-V Elevation of Privilege Vulnerability
Microsoft splwow64 Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.
Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
An improper access control vulnerability in Trend Micro Deep Security Agent 20 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Improper initialization of default settings in TeamViewer Remote Client prior version 15.51.5 for Windows, Linux and macOS, allow a low privileged user to elevate privileges by changing the personal password setting and establishing a remote connection to a logged-in admin account.
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Windows Event Logging Service Elevation of Privilege Vulnerability
Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have an use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Windows DWM Core Library Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability