Filtered by vendor Microsoft
Subscriptions
Filtered by product Windows 11 21h2
Subscriptions
Total
1030 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-29365 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 7.8 High |
Windows Media Remote Code Execution Vulnerability | ||||
CVE-2023-29368 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 7 High |
Windows Filtering Platform Elevation of Privilege Vulnerability | ||||
CVE-2023-29370 | 1 Microsoft | 10 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 7 more | 2025-04-08 | 7.8 High |
Windows Media Remote Code Execution Vulnerability | ||||
CVE-2023-29371 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 7.8 High |
Windows GDI Elevation of Privilege Vulnerability | ||||
CVE-2023-29372 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 8.8 High |
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | ||||
CVE-2023-29373 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 8.8 High |
Microsoft ODBC Driver Remote Code Execution Vulnerability | ||||
CVE-2023-32008 | 1 Microsoft | 10 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 7 more | 2025-04-08 | 7.8 High |
Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | ||||
CVE-2023-32011 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 7.5 High |
Windows iSCSI Discovery Service Denial of Service Vulnerability | ||||
CVE-2023-32014 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 9.8 Critical |
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | ||||
CVE-2023-24937 | 1 Microsoft | 7 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 4 more | 2025-04-08 | 6.5 Medium |
Windows CryptoAPI Denial of Service Vulnerability | ||||
CVE-2023-24938 | 1 Microsoft | 7 Windows 10 1809, Windows 10 21h2, Windows 10 22h2 and 4 more | 2025-04-08 | 6.5 Medium |
Windows CryptoAPI Denial of Service Vulnerability | ||||
CVE-2023-29346 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 7.8 High |
NTFS Elevation of Privilege Vulnerability | ||||
CVE-2023-29351 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 8.1 High |
Windows Group Policy Elevation of Privilege Vulnerability | ||||
CVE-2023-29352 | 1 Microsoft | 8 Remote Desktop, Windows 10 1809, Windows 10 21h2 and 5 more | 2025-04-08 | 6.5 Medium |
Windows Remote Desktop Security Feature Bypass Vulnerability | ||||
CVE-2023-29358 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 7.8 High |
Windows GDI Elevation of Privilege Vulnerability | ||||
CVE-2023-29359 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 7.8 High |
GDI Elevation of Privilege Vulnerability | ||||
CVE-2023-29361 | 1 Microsoft | 5 Windows 10 21h2, Windows 10 22h2, Windows 11 21h2 and 2 more | 2025-04-08 | 7 High |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | ||||
CVE-2023-29362 | 1 Microsoft | 13 Remote Desktop, Windows 10 1507, Windows 10 1607 and 10 more | 2025-04-08 | 8.8 High |
Remote Desktop Client Remote Code Execution Vulnerability | ||||
CVE-2023-29363 | 1 Microsoft | 12 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 9 more | 2025-04-08 | 9.8 Critical |
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | ||||
CVE-2022-30190 | 1 Microsoft | 16 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 13 more | 2025-04-04 | 7.8 High |
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability. |