Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Windows_10_20h2
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 281 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-01-10 | CVE-2023-21674 | Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_rt_8\.1, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022 | 8.8 | ||
2023-04-11 | CVE-2023-28229 | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022 | 7.0 | ||
2023-04-11 | CVE-2023-28252 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022 | 7.8 | ||
2021-06-08 | CVE-2021-31955 | Windows Kernel Information Disclosure Vulnerability | Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_server_2004, Windows_server_2019, Windows_server_20h2 | N/A | ||
2021-06-08 | CVE-2021-33739 | Microsoft DWM Core Library Elevation of Privilege Vulnerability | Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_server_2004, Windows_server_20h2 | N/A | ||
2021-07-22 | CVE-2021-36934 | <p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker must have the ability to execute code on a victim system to... | Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1 | N/A | ||
2021-08-12 | CVE-2021-36948 | Windows Update Medic Service Elevation of Privilege Vulnerability | Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_server_2004, Windows_server_2019, Windows_server_20h2 | N/A | ||
2021-10-13 | CVE-2021-40450 | Win32k Elevation of Privilege Vulnerability | Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_server_2004, Windows_server_2019, Windows_server_2022, Windows_server_20h2 | N/A | ||
2021-10-13 | CVE-2021-41357 | Win32k Elevation of Privilege Vulnerability | Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_11_21h2, Windows_server_2004, Windows_server_2022, Windows_server_20h2 | N/A | ||
2023-02-28 | CVE-2023-1018 | An out-of-bounds read vulnerability exists in TPM2.0's Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM. | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_server_2016, Windows_server_2019, Windows_server_2022, Trusted_platform_module | 5.5 |