Microsoft Vulnerabilities

Comprehensive security vulnerability database for Microsoft products

Last updated: Oct 10, 2023
Total CVEs

64

Critical

3

With Exploits

94

Last 30 Days

0

Severity Distribution

Critical3
5%
High64
100%
Medium34
53%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2023-364198.8

This vulnerability allows an attacker to gain elevated privileges on Azure HDInsight by exploiting the Apache Oozie Workflow Scheduler, potentially letting them access sensitive data or execute unauthorized actions. To take advantage of this flaw, the attacker must have the ability to submit malicious XML data to the system.

microsoftazure hdinsight
Theoretical
over 2 years agoOct 10, 2023
CVE-2023-381567.2

This vulnerability allows an attacker to gain elevated privileges within Azure HDInsight by exploiting a flaw in the Apache Ambari JDBC interface. To take advantage of this, the attacker must have access to the Ambari server, which typically requires some level of authentication or network access.

microsoftazure hdinsight
Exploit Available
over 2 years agoSep 12, 2023
CVE-2021-438907.1

This vulnerability allows an attacker to trick users into installing malicious software through specially crafted files, which can lead to infections from malware like Emotet or Trickbot. To exploit this, the attacker must convince the user to open the malicious attachment, and users with administrative rights are at higher risk than those with limited permissions.

microsoftapp installer
Exploit Available
over 4 years agoDec 15, 2021
CVE-2021-423068.1

This vulnerability allows an attacker with read access to an Azure AD application to access sensitive private key data if it has been improperly uploaded as part of an authentication certificate. This risk arises when users or applications do not follow best practices and store unprotected private keys, potentially exposing them to unauthorized access.

microsoftazure active directory
Exploit Available
over 4 years agoNov 24, 2021
CVE-2021-413727.6

An attacker can upload a malicious Power BI template that includes harmful HTML files, which can then execute scripts in the context of a user’s session, potentially allowing the attacker to gain higher privileges if the victim has admin rights. This requires the victim to be tricked into accessing the malicious HTML files while logged into the Power BI Report Server.

microsoftpower bi report server
Theoretical
over 4 years agoNov 10, 2021
CVE-2021-369587.8

An attacker can take complete control of a Windows system by exploiting a flaw in the Print Spooler service, allowing them to run any program with the highest level of access. To succeed, the attacker needs to be able to send a specially crafted request to the vulnerable system, which could be done remotely.

microsoftwindows
Exploit Available
over 4 years agoAug 12, 2021
CVE-2021-369347.8

This vulnerability allows an attacker to gain full control over a Windows 10 system, enabling them to install software, access or modify data, and create new user accounts with complete rights. To exploit this, the attacker must already be able to run code on the system, and simply updating the software isn't enough; they also need to manually delete certain backup files to fully secure the system.

microsoftwindows 10 1809
Exploit Available
over 4 years agoJul 22, 2021
CVE-2021-344818.8

This vulnerability allows an attacker to run any code they choose on a Windows 10 machine with full system privileges, meaning they could install software, access or delete files, and create new user accounts. It requires the attacker to exploit the Windows Print Spooler service, which is often running on the system, making it a significant risk if not patched.

microsoftwindows 10
Exploit Available
over 4 years agoJul 16, 2021
CVE-2021-268877.8

This vulnerability allows an attacker to redirect another user's personal data to a folder they control, effectively stealing sensitive information. It requires that folder redirection is enabled through Group Policy and that the attacker has access to the same file server as the targeted user.

microsoftwindows 10
Exploit Available
about 5 years agoMar 11, 2021
CVE-2021-241058.4

This vulnerability allows an attacker to insert malicious code into a package manager's repository, which can then be downloaded and executed on developers' machines or during software builds, potentially leading to unauthorized access or control over systems. It primarily affects environments where package managers are improperly configured, allowing the attacker to exploit the system by tricking it into using the malicious package instead of a legitimate one.

microsoftpackage manager configurations
Theoretical
about 5 years agoFeb 25, 2021
CVE-2020-14907.8

This vulnerability allows an attacker to gain higher access rights on a Windows 10 system, potentially letting them control the system or access sensitive data. However, the attacker must first run a malicious application on the victim's computer to exploit this flaw.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14897.8

This vulnerability allows an attacker to gain higher-level access on a Windows 10 system, potentially letting them take control of the machine. However, the attacker must first run a malicious application on the victim's system to exploit this weakness.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14887.0

This vulnerability allows an attacker who is already logged into a Windows 10 system to run a specially crafted application that can gain higher access to system files, potentially letting them modify or delete important data. To exploit this, the attacker must have valid user credentials on the system.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14877.8

This vulnerability allows an attacker to access sensitive information on a user's system, which could lead to further attacks. To exploit it, the attacker needs the user to open a specially crafted file, often by tricking them into clicking a link in an email or message.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14867.8

This vulnerability allows an attacker who has logged into a Windows 10 system to run malicious code with full control over the system, enabling them to install programs, access or delete files, and create new user accounts. To exploit it, the attacker must first be logged on and then run a specially crafted application.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14847.8

This vulnerability allows an attacker to gain higher access rights on a Windows 10 system, enabling them to perform actions they normally wouldn't be able to. However, the attacker must first run a malicious program on the victim's computer to exploit this weakness.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14807.8

This vulnerability allows an attacker to gain full control over a Windows 10 system, enabling them to install software, access or delete files, and create new user accounts with complete rights. However, the attacker must first log into the system and run a specially crafted application to exploit the flaw.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14797.8

This vulnerability allows an attacker to gain full control of a Windows 10 system, enabling them to install programs, alter or delete files, and create new user accounts with complete access. However, the attacker must first log in to the system and then run a specially crafted application to exploit the flaw.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14787.8

This vulnerability allows an attacker to take control of a user's system, enabling them to install programs, access or delete files, and create new accounts with full rights. To exploit it, the attacker typically needs to trick the user into opening a malicious document or visiting a harmful website.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14777.0

An attacker can take control of a victim's computer by exploiting a flaw in Windows Media Foundation, allowing them to install programs, access or delete files, and create new user accounts. This usually requires the victim to open a specially crafted document or visit a malicious website.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
Showing 1 to 20 of 64 results

About Microsoft Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Microsoft products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.