Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network.
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
Windows Telephony Server Elevation of Privilege Vulnerability
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
Windows Kerberos Elevation of Privilege Vulnerability
Azure DevOps Server Remote Code Execution Vulnerability
Windows Kerberos Security Feature Bypass Vulnerability
Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability
Improper verification of cryptographic signature in Microsoft Azure Functions allows an authorized attacker to execute code over a network.
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Improper access control in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.
Heap-based buffer overflow in Windows Core Messaging allows an authorized attacker to elevate privileges over a network.
Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network.
NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause an integer overflow through specially crafted inputs. A successful exploit of this vulnerability might lead to denial of service and data tampering.
The vulnerability function is enabled when the streamer service related to the AfreecaTV communicated through web socket using 21201 port. A stack-based buffer overflow leading to remote code execution was discovered in strcpy() operate by "FanTicket" field. It is because of stored data without validation of length.
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where, when it is launched with the non-default command line option --model-control explicit, an attacker may use the model load API to cause a relative path traversal. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
Windows Print Spooler Elevation of Privilege Vulnerability
Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
Windows Defender Remote Credential Guard Elevation of Privilege Vulnerability
Active Directory Federation Services Elevation of Privilege Vulnerability
Windows Kerberos Elevation of Privilege Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
Windows WebBrowser Control Remote Code Execution Vulnerability
Windows Direct Show Remote Code Execution Vulnerability
Windows Network File System Remote Code Execution Vulnerability
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
Windows Authentication Remote Code Execution Vulnerability
Microsoft SQL Server Remote Code Execution Vulnerability
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
MediaWiki PandocUpload Extension Remote Code Execution Vulnerability
Active Directory Domain Services Elevation of Privilege Vulnerability
Active Directory Domain Services Elevation of Privilege Vulnerability
Windows NTFS Remote Code Execution Vulnerability
A security feature bypass vulnerability exists in Microsoft Windows when the Task Scheduler service fails to properly verify client connections over RPC, aka 'Windows Task Scheduler Security Feature Bypass Vulnerability'.
An elevation of privilege vulnerability exists when Azure DevOps Server and Team Foundation Services improperly handle pipeline job tokens, aka 'Azure DevOps Server and Team Foundation Services Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0815.
An elevation of privilege vulnerability exists when Azure DevOps Server and Team Foundation Services improperly handle pipeline job tokens, aka 'Azure DevOps Server and Team Foundation Services Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0758.
Azure Service Connector Security Feature Bypass Vulnerability
Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
Active Directory Domain Services Elevation of Privilege Vulnerability
Active Directory Domain Services Elevation of Privilege Vulnerability
Azure DevOps Server Remote Code Execution Vulnerability
Windows Active Directory Certificate Services Security Feature Bypass
Windows Deployment Services Remote Code Execution Vulnerability
DCOM Remote Cross-Session Activation Elevation of Privilege Vulnerability
Windows Cryptographic Services Security Feature Bypass Vulnerability
A race condition was identified through which privilege escalation was possible in certain configurations.