Concurrent execution using shared resource with improper synchronization ('race condition') in .NET Framework allows an unauthorized attacker to deny service over a network.
Use after free in Windows Server Update Service allows an authorized attacker to elevate privileges locally.
Heap-based buffer overflow in Windows USB Print Driver allows an unauthorized attacker to elevate privileges with a physical attack.
Untrusted pointer dereference in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code locally.
Improper access control in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally.
Double free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.
Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally.
Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally.
Null pointer dereference in Windows Redirected Drive Buffering allows an authorized attacker to deny service locally.
Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally.
Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.
Stack-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.