Vulnerabilities (CVE)

Vendor filter

Microsoft Subscribe

Filter

6572 total CVE
CVE Vendors Products Updated CVSS
CVE-2019-1019 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2019-06-14 6.5
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.To exploit this vulnerability, an attacker could send a specially crafted authentication request, aka 'Microsoft Windows...
CVE-2019-1069 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2019-06-14 7.2
An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations, aka 'Task Scheduler Elevation of Privilege Vulnerability'.
CVE-2019-1053 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2019-06-14 7.2
An elevation of privilege vulnerability exists when the Windows Shell fails to validate folder shortcuts, aka 'Windows Shell Elevation of Privilege Vulnerability'.
CVE-2019-1064 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2019-06-14 7.2
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'.
CVE-2019-1065 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2019-06-14 7.2
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1041.
CVE-2019-1035 1 Microsoft 4 Office, Office 365 Proplus, Office Online Server and 1 more 2019-06-14 9.3
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1034.
CVE-2019-1017 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2019-06-13 7.2
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0960, CVE-2019-1014.
CVE-2019-0943 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2019-06-13 7.2
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local...
CVE-2019-0998 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2019-06-13 7.2
An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations, aka 'Windows Storage Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0983.
CVE-2019-0996 1 Microsoft 1 Azure Devops Server 2019 2019-06-13 4.3
A spoofing vulnerability exists in Azure DevOps Server when it improperly handles requests to authorize applications, resulting in a cross-site request forgery, aka 'Azure DevOps Server Spoofing Vulnerability'.
CVE-2019-1046 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2019-06-13 4.3
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0968, CVE-2019-0977,...
CVE-2019-0986 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2019-06-13 3.6
An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile Service Elevation of Privilege Vulnerability'.
CVE-2019-1045 1 Microsoft 6 Windows 10, Windows 7, Windows 8.1 and 3 more 2019-06-13 7.2
An elevation of privilege vulnerability exists in the way that the Windows Network File System (NFS) handles objects in memory, aka 'Windows Network File System Elevation of Privilege Vulnerability'.
CVE-2019-1043 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2019-06-13 8.5
A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory, aka 'Comctl32 Remote Code Execution Vulnerability'.
CVE-2019-1044 1 Microsoft 2 Windows 10, Windows Server 2019 2019-06-13 7.2
A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory.To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a...
CVE-2019-0983 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2019-06-13 7.2
An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations, aka 'Windows Storage Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0998.
CVE-2019-1040 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2019-06-13 4.3
A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection, aka 'Windows NTLM Tampering Vulnerability'.
CVE-2019-0959 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2019-06-13 7.2
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'. This CVE ID is unique...
CVE-2019-1022 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2019-06-13 4.6
An elevation of privilege exists in Windows Audio Service, aka 'Windows Audio Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1007, CVE-2019-1021, CVE-2019-1026, CVE-2019-1027, CVE-2019-1028.
CVE-2019-0973 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2019-06-13 7.2
An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.A locally authenticated attacker could run arbitrary code with...