Microsoft Vulnerabilities
Comprehensive security vulnerability database for Microsoft products
64
3
94
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2023-36419 | 8.8 | This vulnerability allows an attacker to gain elevated privileges on Azure HDInsight by exploiting the Apache Oozie Workflow Scheduler, potentially letting them access sensitive data or execute unauthorized actions. To take advantage of this flaw, the attacker must have the ability to submit malicious XML data to the system. | microsoftazure hdinsight | Theoretical | over 2 years agoOct 10, 2023 |
| CVE-2023-38156 | 7.2 | This vulnerability allows an attacker to gain elevated privileges within Azure HDInsight by exploiting a flaw in the Apache Ambari JDBC interface. To take advantage of this, the attacker must have access to the Ambari server, which typically requires some level of authentication or network access. | microsoftazure hdinsight | Exploit Available | over 2 years agoSep 12, 2023 |
| CVE-2021-43890 | 7.1 | This vulnerability allows an attacker to trick users into installing malicious software through specially crafted files, which can lead to infections from malware like Emotet or Trickbot. To exploit this, the attacker must convince the user to open the malicious attachment, and users with administrative rights are at higher risk than those with limited permissions. | microsoftapp installer | Exploit Available | over 4 years agoDec 15, 2021 |
| CVE-2021-42306 | 8.1 | This vulnerability allows an attacker with read access to an Azure AD application to access sensitive private key data if it has been improperly uploaded as part of an authentication certificate. This risk arises when users or applications do not follow best practices and store unprotected private keys, potentially exposing them to unauthorized access. | microsoftazure active directory | Exploit Available | over 4 years agoNov 24, 2021 |
| CVE-2021-41372 | 7.6 | An attacker can upload a malicious Power BI template that includes harmful HTML files, which can then execute scripts in the context of a user’s session, potentially allowing the attacker to gain higher privileges if the victim has admin rights. This requires the victim to be tricked into accessing the malicious HTML files while logged into the Power BI Report Server. | microsoftpower bi report server | Theoretical | over 4 years agoNov 10, 2021 |
| CVE-2021-36958 | 7.8 | An attacker can take complete control of a Windows system by exploiting a flaw in the Print Spooler service, allowing them to run any program with the highest level of access. To succeed, the attacker needs to be able to send a specially crafted request to the vulnerable system, which could be done remotely. | microsoftwindows | Exploit Available | over 4 years agoAug 12, 2021 |
| CVE-2021-36934 | 7.8 | This vulnerability allows an attacker to gain full control over a Windows 10 system, enabling them to install software, access or modify data, and create new user accounts with complete rights. To exploit this, the attacker must already be able to run code on the system, and simply updating the software isn't enough; they also need to manually delete certain backup files to fully secure the system. | microsoftwindows 10 1809 | Exploit Available | over 4 years agoJul 22, 2021 |
| CVE-2021-34481 | 8.8 | This vulnerability allows an attacker to run any code they choose on a Windows 10 machine with full system privileges, meaning they could install software, access or delete files, and create new user accounts. It requires the attacker to exploit the Windows Print Spooler service, which is often running on the system, making it a significant risk if not patched. | microsoftwindows 10 | Exploit Available | over 4 years agoJul 16, 2021 |
| CVE-2021-26887 | 7.8 | This vulnerability allows an attacker to redirect another user's personal data to a folder they control, effectively stealing sensitive information. It requires that folder redirection is enabled through Group Policy and that the attacker has access to the same file server as the targeted user. | microsoftwindows 10 | Exploit Available | about 5 years agoMar 11, 2021 |
| CVE-2021-24105 | 8.4 | This vulnerability allows an attacker to insert malicious code into a package manager's repository, which can then be downloaded and executed on developers' machines or during software builds, potentially leading to unauthorized access or control over systems. It primarily affects environments where package managers are improperly configured, allowing the attacker to exploit the system by tricking it into using the malicious package instead of a legitimate one. | microsoftpackage manager configurations | Theoretical | about 5 years agoFeb 25, 2021 |
| CVE-2020-1490 | 7.8 | This vulnerability allows an attacker to gain higher access rights on a Windows 10 system, potentially letting them control the system or access sensitive data. However, the attacker must first run a malicious application on the victim's computer to exploit this flaw. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1489 | 7.8 | This vulnerability allows an attacker to gain higher-level access on a Windows 10 system, potentially letting them take control of the machine. However, the attacker must first run a malicious application on the victim's system to exploit this weakness. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1488 | 7.0 | This vulnerability allows an attacker who is already logged into a Windows 10 system to run a specially crafted application that can gain higher access to system files, potentially letting them modify or delete important data. To exploit this, the attacker must have valid user credentials on the system. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1487 | 7.8 | This vulnerability allows an attacker to access sensitive information on a user's system, which could lead to further attacks. To exploit it, the attacker needs the user to open a specially crafted file, often by tricking them into clicking a link in an email or message. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1486 | 7.8 | This vulnerability allows an attacker who has logged into a Windows 10 system to run malicious code with full control over the system, enabling them to install programs, access or delete files, and create new user accounts. To exploit it, the attacker must first be logged on and then run a specially crafted application. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1484 | 7.8 | This vulnerability allows an attacker to gain higher access rights on a Windows 10 system, enabling them to perform actions they normally wouldn't be able to. However, the attacker must first run a malicious program on the victim's computer to exploit this weakness. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1480 | 7.8 | This vulnerability allows an attacker to gain full control over a Windows 10 system, enabling them to install software, access or delete files, and create new user accounts with complete rights. However, the attacker must first log into the system and run a specially crafted application to exploit the flaw. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1479 | 7.8 | This vulnerability allows an attacker to gain full control of a Windows 10 system, enabling them to install programs, alter or delete files, and create new user accounts with complete access. However, the attacker must first log in to the system and then run a specially crafted application to exploit the flaw. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1478 | 7.8 | This vulnerability allows an attacker to take control of a user's system, enabling them to install programs, access or delete files, and create new accounts with full rights. To exploit it, the attacker typically needs to trick the user into opening a malicious document or visiting a harmful website. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1477 | 7.0 | An attacker can take control of a victim's computer by exploiting a flaw in Windows Media Foundation, allowing them to install programs, access or delete files, and create new user accounts. This usually requires the victim to open a specially crafted document or visit a malicious website. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
About Microsoft Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Microsoft products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.