Microsoft Vulnerabilities
Comprehensive security vulnerability database for Microsoft products
3
3
94
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2020-1467 | 10.0 | This vulnerability allows an attacker to gain elevated privileges on a Windows 10 system, potentially giving them control over important files. However, the attacker must first log in to the system and run a specially designed application to exploit this weakness. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1025 | 9.8 | This vulnerability allows an attacker to bypass authentication and gain unauthorized access to Microsoft SharePoint Server and Skype for Business Server. To exploit it, the attacker needs to modify an OAuth token, which means they must have some level of access to the system to create or alter the token. | microsoftlync | Exploit Available | over 5 years agoJul 14, 2020 |
| CVE-2019-0736 | 9.8 | An attacker can take control of a Windows 10 machine by sending specially crafted DHCP responses to it, allowing them to run any code they choose. This requires the attacker to be on the same network as the target device, making it crucial to secure your network from unauthorized access. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
About Microsoft Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Microsoft products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.