Microsoft Vulnerabilities

Comprehensive security vulnerability database for Microsoft products

Last updated: Oct 10, 2023
Total CVEs

101

Critical

3

With Exploits

94

Last 30 Days

0

Severity Distribution

Critical3
3%
High64
63%
Medium34
34%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2023-364198.8

This vulnerability allows an attacker to gain elevated privileges on Azure HDInsight by exploiting the Apache Oozie Workflow Scheduler, potentially letting them access sensitive data or execute unauthorized actions. To take advantage of this flaw, the attacker must have the ability to submit malicious XML data to the system.

microsoftazure hdinsight
Theoretical
over 2 years agoOct 10, 2023
CVE-2023-381567.2

This vulnerability allows an attacker to gain elevated privileges within Azure HDInsight by exploiting a flaw in the Apache Ambari JDBC interface. To take advantage of this, the attacker must have access to the Ambari server, which typically requires some level of authentication or network access.

microsoftazure hdinsight
Exploit Available
over 2 years agoSep 12, 2023
CVE-2023-381884.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight, potentially gaining unauthorized access to sensitive data or resources. To exploit this flaw, the attacker must be able to send specially crafted requests to the system, which requires some level of access to the network where HDInsight is deployed.

microsoftazure hdinsight
Theoretical
over 2 years agoAug 8, 2023
CVE-2023-368814.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight, potentially gaining unauthorized access to sensitive data and resources. To exploit this, the attacker must already have access to the network where the Azure service is running.

microsoftazure hdinsight
Theoretical
over 2 years agoAug 8, 2023
CVE-2023-368774.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight's Apache Oozie service, potentially leading to unauthorized access to sensitive data or operations. To exploit this, the attacker must have network access to the affected service and be able to send specially crafted requests.

microsoftazure hdinsight
Exploit Available
over 2 years agoAug 8, 2023
CVE-2023-353944.6

This vulnerability allows an attacker to spoof a Jupyter Notebook in Azure HDInsight, potentially misleading users into executing malicious code. To exploit this, the attacker must have access to the same network or environment where the vulnerable service is running.

microsoftazure hdinsight
Exploit Available
over 2 years agoAug 8, 2023
CVE-2023-353934.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight, potentially gaining unauthorized access to sensitive data or resources. To exploit this flaw, the attacker must have network access to the affected system and be able to send specially crafted requests.

microsoftazure hdinsight
Theoretical
over 2 years agoAug 8, 2023
CVE-2023-234084.5

This vulnerability allows an attacker to impersonate a legitimate user within Azure HDInsight, potentially gaining unauthorized access to sensitive information or control over the system. To exploit this, the attacker must be able to send specially crafted requests to the Apache Ambari service, which manages the cluster.

microsoftazure hdinsight
Exploit Available
about 3 years agoMar 14, 2023
CVE-2021-438907.1

This vulnerability allows an attacker to trick users into installing malicious software through specially crafted files, which can lead to infections from malware like Emotet or Trickbot. To exploit this, the attacker must convince the user to open the malicious attachment, and users with administrative rights are at higher risk than those with limited permissions.

microsoftapp installer
Exploit Available
over 4 years agoDec 15, 2021
CVE-2021-423068.1

This vulnerability allows an attacker with read access to an Azure AD application to access sensitive private key data if it has been improperly uploaded as part of an authentication certificate. This risk arises when users or applications do not follow best practices and store unprotected private keys, potentially exposing them to unauthorized access.

microsoftazure active directory
Exploit Available
over 4 years agoNov 24, 2021
CVE-2021-413727.6

An attacker can upload a malicious Power BI template that includes harmful HTML files, which can then execute scripts in the context of a user’s session, potentially allowing the attacker to gain higher privileges if the victim has admin rights. This requires the victim to be tricked into accessing the malicious HTML files while logged into the Power BI Report Server.

microsoftpower bi report server
Theoretical
over 4 years agoNov 10, 2021
CVE-2021-369587.8

An attacker can take complete control of a Windows system by exploiting a flaw in the Print Spooler service, allowing them to run any program with the highest level of access. To succeed, the attacker needs to be able to send a specially crafted request to the vulnerable system, which could be done remotely.

microsoftwindows
Exploit Available
over 4 years agoAug 12, 2021
CVE-2021-369347.8

This vulnerability allows an attacker to gain full control over a Windows 10 system, enabling them to install software, access or modify data, and create new user accounts with complete rights. To exploit this, the attacker must already be able to run code on the system, and simply updating the software isn't enough; they also need to manually delete certain backup files to fully secure the system.

microsoftwindows 10 1809
Exploit Available
over 4 years agoJul 22, 2021
CVE-2021-344818.8

This vulnerability allows an attacker to run any code they choose on a Windows 10 machine with full system privileges, meaning they could install software, access or delete files, and create new user accounts. It requires the attacker to exploit the Windows Print Spooler service, which is often running on the system, making it a significant risk if not patched.

microsoftwindows 10
Exploit Available
over 4 years agoJul 16, 2021
CVE-2021-268877.8

This vulnerability allows an attacker to redirect another user's personal data to a folder they control, effectively stealing sensitive information. It requires that folder redirection is enabled through Group Policy and that the attacker has access to the same file server as the targeted user.

microsoftwindows 10
Exploit Available
about 5 years agoMar 11, 2021
CVE-2021-241058.4

This vulnerability allows an attacker to insert malicious code into a package manager's repository, which can then be downloaded and executed on developers' machines or during software builds, potentially leading to unauthorized access or control over systems. It primarily affects environments where package managers are improperly configured, allowing the attacker to exploit the system by tricking it into using the malicious package instead of a legitimate one.

microsoftpackage manager configurations
Theoretical
about 5 years agoFeb 25, 2021
CVE-2021-17305.4

This vulnerability allows an attacker to impersonate a user in Microsoft Exchange Server, potentially tricking others into believing they are communicating with that user. To exploit this, the attacker may need to manipulate how images are loaded in emails, so it's important for users to follow Microsoft's recommendations for securing their settings.

microsoftexchange server
Exploit Available
about 5 years agoFeb 25, 2021
CVE-2020-14907.8

This vulnerability allows an attacker to gain higher access rights on a Windows 10 system, potentially letting them control the system or access sensitive data. However, the attacker must first run a malicious application on the victim's computer to exploit this flaw.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14897.8

This vulnerability allows an attacker to gain higher-level access on a Windows 10 system, potentially letting them take control of the machine. However, the attacker must first run a malicious application on the victim's system to exploit this weakness.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14887.0

This vulnerability allows an attacker who is already logged into a Windows 10 system to run a specially crafted application that can gain higher access to system files, potentially letting them modify or delete important data. To exploit this, the attacker must have valid user credentials on the system.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
Showing 1 to 20 of 101 results

About Microsoft Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Microsoft products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.