Microsoft Vulnerabilities

Comprehensive security vulnerability database for Microsoft products

Last updated: Aug 8, 2023
Total CVEs

34

Critical

3

With Exploits

94

Last 30 Days

0

Severity Distribution

Critical3
9%
High64
188%
Medium34
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2023-381884.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight, potentially gaining unauthorized access to sensitive data or resources. To exploit this flaw, the attacker must be able to send specially crafted requests to the system, which requires some level of access to the network where HDInsight is deployed.

microsoftazure hdinsight
Theoretical
over 2 years agoAug 8, 2023
CVE-2023-368814.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight, potentially gaining unauthorized access to sensitive data and resources. To exploit this, the attacker must already have access to the network where the Azure service is running.

microsoftazure hdinsight
Theoretical
over 2 years agoAug 8, 2023
CVE-2023-368774.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight's Apache Oozie service, potentially leading to unauthorized access to sensitive data or operations. To exploit this, the attacker must have network access to the affected service and be able to send specially crafted requests.

microsoftazure hdinsight
Exploit Available
over 2 years agoAug 8, 2023
CVE-2023-353944.6

This vulnerability allows an attacker to spoof a Jupyter Notebook in Azure HDInsight, potentially misleading users into executing malicious code. To exploit this, the attacker must have access to the same network or environment where the vulnerable service is running.

microsoftazure hdinsight
Exploit Available
over 2 years agoAug 8, 2023
CVE-2023-353934.5

This vulnerability allows an attacker to impersonate a legitimate user in Azure HDInsight, potentially gaining unauthorized access to sensitive data or resources. To exploit this flaw, the attacker must have network access to the affected system and be able to send specially crafted requests.

microsoftazure hdinsight
Theoretical
over 2 years agoAug 8, 2023
CVE-2023-234084.5

This vulnerability allows an attacker to impersonate a legitimate user within Azure HDInsight, potentially gaining unauthorized access to sensitive information or control over the system. To exploit this, the attacker must be able to send specially crafted requests to the Apache Ambari service, which manages the cluster.

microsoftazure hdinsight
Exploit Available
about 3 years agoMar 14, 2023
CVE-2021-17305.4

This vulnerability allows an attacker to impersonate a user in Microsoft Exchange Server, potentially tricking others into believing they are communicating with that user. To exploit this, the attacker may need to manipulate how images are loaded in emails, so it's important for users to follow Microsoft's recommendations for securing their settings.

microsoftexchange server
Exploit Available
about 5 years agoFeb 25, 2021
CVE-2020-14855.5

This vulnerability allows an attacker to access sensitive information from a Windows 10 system by connecting a device like a camera or scanner and running a specially designed application. To exploit this, the attacker must already have access to the system and be able to connect their device to it.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14835.0

This vulnerability allows an attacker to run harmful code on a user's computer if they can trick the user into opening a specially crafted file in Microsoft Outlook. It’s particularly dangerous for users with administrative rights, as it could let the attacker take full control of the system, install programs, or access sensitive data.

microsoft365 apps
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14765.5

This vulnerability allows an attacker to access restricted files on a web server running ASP.NET or .NET applications if they send a specially crafted request. To exploit this, the attacker needs to target a server that has not been updated to fix this issue.

microsoft.net framework
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14725.5

This vulnerability allows an attacker to gain domain administrator access to a Windows Server by exploiting a weak connection method used by the server's authentication system. To do this, the attacker must connect to the server without needing to log in, which means they can potentially take control of the entire network if they are on the same network.

microsoftwindows server 1903
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14555.3

An attacker can cause Microsoft SQL Server Management Studio to crash, leading to a denial of service that disrupts its functionality. However, they must first have the ability to execute code on the victim's system to exploit this vulnerability.

microsoftsql server management studio
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14175.5

This vulnerability allows an attacker who has already logged into a Windows 10 system to run malicious code with high-level permissions, potentially letting them install software, access or modify files, or create new user accounts. To exploit it, the attacker needs to run a specially crafted application on the system.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-13835.5

This vulnerability allows an attacker to gather sensitive information from a Windows 10 system that has the Routing and Remote Access feature enabled, potentially leading to further attacks. However, only systems with this feature turned on are at risk, as it is not enabled by default.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-13795.5

An attacker can take control of a victim's computer, allowing them to install programs, change or delete files, or create new user accounts with full access. This vulnerability can be exploited if the victim opens a specially crafted document or visits a malicious website.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2019-11724.3

An attacker can take over a user's account by tricking them into visiting a malicious website that steals their login token. This requires the user to click on a specially crafted link, making it crucial for users to be cautious about where they browse.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11715.6

This vulnerability allows an attacker who has logged into a Windows 10 system to run a specially crafted application that can reveal sensitive information, potentially leading to further attacks on the system. While it doesn't let the attacker execute code or gain higher privileges directly, the leaked information could help them compromise the system in other ways.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11635.5

An attacker can inject malicious code into a signed CAB file without breaking its signature, allowing them to trick a user into running the compromised file. To exploit this, the attacker needs to modify the CAB file and convince the target user to execute it.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11585.5

This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of the device. To exploit it, the attacker might trick the user into opening a malicious document or visiting a harmful website.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11545.5

An attacker can exploit this vulnerability to access sensitive information from a user's system, which could help them take further control over it. To do this, the attacker might trick the user into opening a malicious document or visiting a harmful website.

microsoftwindows 7
Exploit Available
over 6 years agoAug 14, 2019
Showing 1 to 20 of 34 results

About Microsoft Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Microsoft products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.