Microsoft Windows Error Reporting Service contains an improper privilege management vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.
Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Local privilege escalation vulnerability in Windows clients of Netop Vision Pro up to and including 9.7.1 allows a local user to gain administrator privileges whilst using the clients.
Windows Win32k Elevation of Privilege Vulnerability
Storage Spaces Controller Elevation of Privilege Vulnerability
Microsoft Defender Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
DirectX Elevation of Privilege Vulnerability
Azure IoT CLI extension Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
Windows Win32k Elevation of Privilege Vulnerability
Improper privilege management in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows.
Windows InstallService Elevation of Privilege Vulnerability
Windows WalletService Elevation of Privilege Vulnerability
Sysinternals PsExec Elevation of Privilege Vulnerability
Microsoft splwow64 Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Windows Multipoint Management Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows WLAN Service Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows Fax Compose Form Remote Code Execution Vulnerability
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Windows Update Stack Setup Elevation of Privilege Vulnerability
Windows WalletService Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows Event Logging Service Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows Hyper-V Elevation of Privilege Vulnerability
Active Template Library Elevation of Privilege Vulnerability
In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could arbitrarily delete local system files with SYSTEM privilege, potentially leading to local privilege escalation.
Windows CSC Service Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
Windows WalletService Elevation of Privilege Vulnerability
Windows WalletService Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability
In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege.
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
Windows CSC Service Elevation of Privilege Vulnerability