SB2022102043 - Multiple vulnerabilities in Dell EMC Unisphere for PowerMax and Dell EMC Solutions Enabler
Published: October 20, 2022 Updated: July 24, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 289 secuirty vulnerabilities.
1) Security restrictions bypass (CVE-ID: CVE-2021-31199)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improperly imposed security restrictions in Microsoft Enhanced Cryptographic Provider. A local user can bypass implemented security restrictions and read or modify otherwise restricted information.
Note, the vulnerability is being actively exploited in the wild and related to a zero-day vulnerability in Adobe Reader #VU53125 (CVE-2021-28550) patched on May 11.
2) Buffer overflow (CVE-ID: CVE-2021-31959)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the Scripting Engine. A remote attacker can trick a victim to open a specially crafted file or visit a malicious website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31958)
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows NTLM. A remote attacker can trick a victim to visit a specially crafted server share or website, which leads to security restrictions bypass and privilege escalation.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31956)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists within the NTFS subsystem in Microsoft Windows. A local user can run a specially crafted program to execute arbitrary code with elevated privileges.
5) Heap-based buffer overflow (CVE-ID: CVE-2021-31954)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Windows Common Log File System Driver. A local user can run a specially crafted program to trigger a heap-based buffer overflow and execute arbitrary code with SYSTEM privileges.6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31953)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Filter Manager, which leads to security restrictions bypass and privilege escalation.
7) Security restrictions bypass (CVE-ID: CVE-2021-31201)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improperly imposed security restrictions in Microsoft Enhanced Cryptographic Provider. A local user can bypass implemented security restrictions and read or modify otherwise restricted information.
Note, the vulnerability is being actively exploited in the wild and related to a zero-day vulnerability in Adobe Reader #VU53125 (CVE-2021-28550) patched on May 11.8) Code Injection (CVE-ID: CVE-2021-31194)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in OLE Automation. A remote authenticated attacker can execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
9) Security features bypass (CVE-ID: CVE-2021-31968)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to security feature bypass issue in Windows Remote Desktop Services. A remote attacker can cause a denial of service condition on the target system.
10) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31193)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows SSDP Service, which leads to security restrictions bypass and privilege escalation.
11) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31188)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Graphics Component, which leads to security restrictions bypass and privilege escalation.
12) Out-of-bounds read (CVE-ID: CVE-2021-31186)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in Windows Remote Desktop Protocol (RDP). A remote attacker can trick a victim to connect to a malicious RDP server, trigger out-of-bounds read error and read contents of memory on the system.
13) Out-of-bounds read (CVE-ID: CVE-2021-31184)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in Microsoft Windows Infrared Data Association (IrDA). A local user can trigger out-of-bounds read error and read contents of memory on the system.
14) Input validation error (CVE-ID: CVE-2021-31183)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Windows TCP/IP Driver. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
15) Spoofing attack (CVE-ID: CVE-2021-31182)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in Microsoft Bluetooth Driver. A remote attacker on the local network can spoof page content.
16) Security features bypass (CVE-ID: CVE-2021-31962)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Kerberos AppContainer. A remote attacker can bypass Kerberos authentication.
17) Security restrictins bypass (CVE-ID: CVE-2021-31971)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to Windows HTML Platform does not properly impose security restrictions. A remote attacker can create a specially crafted web page, trick the victim into opening it and bypass implemented security restrictions.
18) Information disclosure (CVE-ID: CVE-2021-28446)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Portmapping. A local user can gain unauthorized access to sensitive information on the system.
19) Spoofing attack (CVE-ID: CVE-2021-33765)
The vulnerability allows a local attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in the Windows Installer. A local attacker can spoof page content.
20) Security features bypass (CVE-ID: CVE-2021-34446)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Windows HTML Platforms. A remote attacker can gain elevated privileges on the target system.
21) Code Injection (CVE-ID: CVE-2021-34441)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Microsoft Windows Media Foundation. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
22) Information disclosure (CVE-ID: CVE-2021-34440)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in GDI+. A local user can gain unauthorized access to sensitive information on the system.
23) Input validation error (CVE-ID: CVE-2021-33788)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Windows LSA. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
24) Information disclosure (CVE-ID: CVE-2021-33783)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows SMB. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
25) Spoofing attack (CVE-ID: CVE-2021-33782)
The vulnerability allows a local attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in the Windows Authenticode. A local attacker can spoof page content.
26) Security features bypass (CVE-ID: CVE-2021-33757)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Windows Security Account Manager Remote Protocol. A remote attacker can gain access to sensitive information on the system.
27) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31973)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows GPSVC, which leads to security restrictions bypass and privilege escalation.
28) Code Injection (CVE-ID: CVE-2021-33756)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows DNS Snap-in. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
29) Code Injection (CVE-ID: CVE-2021-33752)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows DNS Snap-in. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
30) Code Injection (CVE-ID: CVE-2021-33750)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows DNS Snap-in. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
31) Code Injection (CVE-ID: CVE-2021-33749)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows DNS Snap-in. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
32) Buffer overflow (CVE-ID: CVE-2021-33742)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content within Windows MSHTML Platform. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
33) Buffer overflow (CVE-ID: CVE-2021-31979)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Windows kernel. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the system with elevated privileges.
Note, the vulnerability is being actively exploited in the wild.34) Code Injection (CVE-ID: CVE-2021-28455)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Microsoft Jet Red Database Engine and Access Connectivity Engine. A remote authenticated attacker can execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
35) Code Injection (CVE-ID: CVE-2021-28445)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Windows Network File System. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
36) Buffer overflow (CVE-ID: CVE-2021-34448)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content in Microsoft scripting engine. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note, the vulnerability is being actively exploited in the wild.
37) Code Injection (CVE-ID: CVE-2021-28335)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
38) Code Injection (CVE-ID: CVE-2021-28341)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
39) Code Injection (CVE-ID: CVE-2021-28340)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
40) Code Injection (CVE-ID: CVE-2021-28339)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
41) Code Injection (CVE-ID: CVE-2021-28338)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
42) Code Injection (CVE-ID: CVE-2021-28337)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
43) Code Injection (CVE-ID: CVE-2021-28336)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
44) Code Injection (CVE-ID: CVE-2021-28334)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
45) Code Injection (CVE-ID: CVE-2021-28343)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
46) Code Injection (CVE-ID: CVE-2021-28333)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
47) Code Injection (CVE-ID: CVE-2021-28332)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
48) Code Injection (CVE-ID: CVE-2021-28331)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
49) Code Injection (CVE-ID: CVE-2021-28330)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
50) Code Injection (CVE-ID: CVE-2021-28329)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
51) Information disclosure (CVE-ID: CVE-2021-28328)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows DNS. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
52) Code Injection (CVE-ID: CVE-2021-28342)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
53) Code Injection (CVE-ID: CVE-2021-28344)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
54) Input validation error (CVE-ID: CVE-2021-28443)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Windows Console Driver. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
55) Code Injection (CVE-ID: CVE-2021-28356)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
56) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-28440)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Installer, which leads to security restrictions bypass and privilege escalation.
57) Input validation error (CVE-ID: CVE-2021-28439)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Windows TCP/IP Driver. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
58) Information disclosure (CVE-ID: CVE-2021-28437)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows Installer. A local user can gain unauthorized access to sensitive information on the system.
59) Code Injection (CVE-ID: CVE-2021-28434)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
60) Code Injection (CVE-ID: CVE-2021-28358)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
61) Code Injection (CVE-ID: CVE-2021-28357)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
62) Code Injection (CVE-ID: CVE-2021-28355)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
63) Code Injection (CVE-ID: CVE-2021-28345)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
64) Code Injection (CVE-ID: CVE-2021-28354)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
65) Code Injection (CVE-ID: CVE-2021-28353)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
66) Code Injection (CVE-ID: CVE-2021-28352)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
67) Code Injection (CVE-ID: CVE-2021-28350)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows GDI+. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
68) Code Injection (CVE-ID: CVE-2021-28349)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows GDI+. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
69) Code Injection (CVE-ID: CVE-2021-28348)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows GDI+. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
70) Code Injection (CVE-ID: CVE-2021-28346)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
71) Code Injection (CVE-ID: CVE-2021-34447)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows MSHTML Platform. A remote attacker can trick a victim to visit a specially crafted server share or website and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
72) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34456)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Remote Access Connection Manager, which leads to security restrictions bypass and privilege escalation.
73) Information disclosure (CVE-ID: CVE-2021-28323)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows DNS. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
74) Information disclosure (CVE-ID: CVE-2021-33763)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows Remote Access Connection Manager. A local user can gain unauthorized access to sensitive information on the system.
75) Input validation error (CVE-ID: CVE-2021-33785)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Windows AF_UNIX Socket Provider. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
76) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-33784)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Cloud Files Mini Filter Driver, which leads to security restrictions bypass and privilege escalation.
77) Security features bypass (CVE-ID: CVE-2021-33781)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Active Directory. A remote authenticated attacker can gain elevated privileges on the target system.
78) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-33774)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Event Tracing, which leads to security restrictions bypass and privilege escalation.
79) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-33773)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Remote Access Connection Manager, which leads to security restrictions bypass and privilege escalation.
80) Buffer overflow (CVE-ID: CVE-2021-33771)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the system with elevated privileges.
Note, the vulnerability is being actively exploited in the wild.
81) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-33761)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Remote Access Connection Manager, which leads to security restrictions bypass and privilege escalation.
82) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34445)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Remote Access Connection Manager, which leads to security restrictions bypass and privilege escalation.
83) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-33759)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Desktop Bridge, which leads to security restrictions bypass and privilege escalation.
84) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-33751)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Storage Spaces Controller, which leads to security restrictions bypass and privilege escalation.
85) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-33743)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Projected File System, which leads to security restrictions bypass and privilege escalation.
86) Code Injection (CVE-ID: CVE-2021-33740)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows Media. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
87) Information disclosure (CVE-ID: CVE-2021-31976)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Server for NFS. A remote attacker can gain unauthorized access to sensitive information on the system.
88) Information disclosure (CVE-ID: CVE-2021-31975)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Server for NFS. A remote attacker can gain unauthorized access to sensitive information on the system.
89) Code Injection (CVE-ID: CVE-2021-34438)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows Font Driver Host. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
90) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34449)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Win32k, which leads to security restrictions bypass and privilege escalation.
91) Information disclosure (CVE-ID: CVE-2021-31972)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Event Tracing for Windows. A local user can gain unauthorized access to sensitive information on the system.
92) Information disclosure (CVE-ID: CVE-2021-34491)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Win32k. A local user can gain unauthorized access to sensitive information on the system.
93) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34512)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Storage Spaces Controller, which leads to security restrictions bypass and privilege escalation.
94) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34510)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Storage Spaces Controller, which leads to security restrictions bypass and privilege escalation.
95) Information disclosure (CVE-ID: CVE-2021-34509)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Storage Spaces Controller. A local user can gain unauthorized access to sensitive information on the system.
96) Code Injection (CVE-ID: CVE-2021-34508)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows Kernel. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
97) Code Injection (CVE-ID: CVE-2021-34503)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Microsoft Windows Media Foundation. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
98) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34493)
The vulnerability allows a local administrator to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Partition Management Driver, which leads to security restrictions bypass and privilege escalation.
99) Input validation error (CVE-ID: CVE-2021-34490)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Windows TCP/IP Driver. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
100) Information disclosure (CVE-ID: CVE-2021-34454)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows Remote Access Connection Manager. A local user can gain unauthorized access to sensitive information on the system.
101) Code Injection (CVE-ID: CVE-2021-34489)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in DirectWrite. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
102) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34488)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Console Driver, which leads to security restrictions bypass and privilege escalation.
103) Security features bypass (CVE-ID: CVE-2021-34466)
The vulnerability allows a local attacker to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Windows Hello. An attacker with physical access can gain elevated privileges on the target system.
104) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34462)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows AppX Deployment Extensions, which leads to security restrictions bypass and privilege escalation.
105) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34460)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Storage Spaces Controller, which leads to security restrictions bypass and privilege escalation.
106) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34459)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows AppContainer, which leads to security restrictions bypass and privilege escalation.
107) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34455)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows File History Service, which leads to security restrictions bypass and privilege escalation.
108) Input validation error (CVE-ID: CVE-2021-31974)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Server for NFS. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
109) Security features bypass (CVE-ID: CVE-2021-31970)
The vulnerability allows a local user to perform a denial of service (DoS) attack..
The vulnerability exists due to security feature bypass issue in Windows TCP/IP Driver. A local user can cause a denial of service condition on the target system.
110) Information disclosure (CVE-ID: CVE-2021-34457)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows Remote Access Connection Manager. A local user can gain unauthorized access to sensitive information on the system.
111) Code Injection (CVE-ID: CVE-2021-34497)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows MSHTML Platform. A remote attacker can trick a victim to visit a specially crafted server share or website and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
112) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34514)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Kernel, which leads to security restrictions bypass and privilege escalation.
113) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34511)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Installer, which leads to security restrictions bypass and privilege escalation.
114) Information disclosure (CVE-ID: CVE-2021-34507)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows Remote Assistance. A remote attacker can gain unauthorized access to sensitive information on the system.
115) Code Injection (CVE-ID: CVE-2021-34504)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows Address Book. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
116) Information disclosure (CVE-ID: CVE-2021-34500)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows Kernel Hyper-V host server. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
117) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34498)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows GDI, which leads to security restrictions bypass and privilege escalation.
118) Information disclosure (CVE-ID: CVE-2021-34496)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows GDI. A local user can gain unauthorized access to sensitive information on the system.
119) Code Injection (CVE-ID: CVE-2021-34527)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation within the RpcAddPrinterDriverEx() function. A remote user can send a specially crafted request to the Windows Print Spooler and execute arbitrary code with SYSTEM privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note, the vulnerability is being considered a zero-day and dubbed PrintNightmare. This is a different vulnerability than #VU54508 (CVE-2021-1675).
120) Spoofing attack (CVE-ID: CVE-2021-34492)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in Windows Certificate. A remote attacker can spoof page content.
121) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34484)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows User Profile Service, which leads to security restrictions bypass and privilege escalation.
122) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34483)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
123) Buffer overflow (CVE-ID: CVE-2021-34481)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when the Windows Print Spooler service improperly performs privileged file operations. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system with SYSTEM privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
124) Buffer overflow (CVE-ID: CVE-2021-34480)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to incorrect JIT optimization in jscript9.dll in the Scripting Engine. A remote attacker can trick a victim to open a specially crafted file or visit a malicious website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
125) Input validation error (CVE-ID: CVE-2021-34476)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Bowser.sys. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
126) Untrusted Pointer Dereference (CVE-ID: CVE-2021-34516)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to untrusted pointer dereference in DrvTransparentBltInternal() within the Microsoft Windows Canonical Display Driver cdd.dll. A local user can run a specially crafted program to execute arbitrary code with SYSTEM privileges.
127) Code Injection (CVE-ID: CVE-2021-34533)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows Graphics Component Font Parsing. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
128) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31969)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Cloud Files Mini Filter Driver, which leads to security restrictions bypass and privilege escalation.
129) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31187)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows WalletService, which leads to security restrictions bypass and privilege escalation.
130) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31961)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows InstallService. A local user can delete targeted files on the system.
131) Improper Privilege Management (CVE-ID: CVE-2021-31955)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to improper privilege management. A local unprivileged user can read contents of Kernel memory from a user mode process.
Note, the vulnerability is being actively exploited in the wild.
132) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31952)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Kernel-Mode Driver, which leads to security restrictions bypass and privilege escalation.
133) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31951)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Kernel, which leads to security restrictions bypass and privilege escalation.
134) Out-of-bounds read (CVE-ID: CVE-2021-31191)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in Windows Projected File System FS Filter Driver. A local user can trigger out-of-bounds read error and read contents of memory on the system.
135) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31190)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Container Isolation FS Filter Driver, which leads to security restrictions bypass and privilege escalation.
136) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31170)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Graphics Component, which leads to security restrictions bypass and privilege escalation.
137) Code Injection (CVE-ID: CVE-2021-34535)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Remote Desktop Client and Hyper-V Viewer. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
138) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31167)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Container Manager Service, which leads to security restrictions bypass and privilege escalation.
139) Information disclosure (CVE-ID: CVE-2021-28479)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows CSC Service. A local user can gain unauthorized access to sensitive information on the system.
140) Code Injection (CVE-ID: CVE-2021-36947)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows Print Spooler. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
141) Code Injection (CVE-ID: CVE-2021-36937)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows Media MPEG-4 Video Decoder. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
142) Code Injection (CVE-ID: CVE-2021-36936)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows Print Spooler. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
143) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-36927)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Digital TV Tuner device registration application, which leads to security restrictions bypass and privilege escalation.
144) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34537)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Bluetooth Driver, which leads to security restrictions bypass and privilege escalation.
145) Code Injection (CVE-ID: CVE-2021-28327)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Remote Procedure Call Runtime. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
146) Information disclosure (CVE-ID: CVE-2021-28318)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows GDI+. A local user can gain unauthorized access to sensitive information on the system.
147) Information disclosure (CVE-ID: CVE-2020-17000)
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by Remote Desktop Protocol Client. A remote user can gain unauthorized access to sensitive information on the system.
148) Information disclosure (CVE-ID: CVE-2020-17036)
The vulnerability allows a local attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows Function Discovery SSDP Provider. A local attacker can gain unauthorized access to sensitive information on the system.
149) Information disclosure (CVE-ID: CVE-2020-17029)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Canonical Display Driver. A local user can gain unauthorized access to sensitive information on the system.
150) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-17014)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
151) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-17011)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Port Class Library, which leads to security restrictions bypass and privilege escalation.
152) Information disclosure (CVE-ID: CVE-2020-17004)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Graphics Component. A local user can gain unauthorized access to sensitive information on the system.
153) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-17001)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
154) Information disclosure (CVE-ID: CVE-2020-16997)
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output in the Remote Desktop Protocol server. A remote authenticated user can gain unauthorized access to sensitive information on the system.
155) Code Injection (CVE-ID: CVE-2020-17042)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Windows Print Spooler. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
156) Buffer overflow (CVE-ID: CVE-2020-16976)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when the Windows Backup Service improperly handles file operations. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
157) Buffer overflow (CVE-ID: CVE-2020-16975)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when the Windows Backup Service improperly handles file operations. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
158) Buffer overflow (CVE-ID: CVE-2020-16974)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when the Windows Backup Service improperly handles file operations. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
159) Buffer overflow (CVE-ID: CVE-2020-16973)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when the Windows Backup Service improperly handles file operations. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
160) Buffer overflow (CVE-ID: CVE-2020-16972)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when the Windows Backup Service improperly handles file operations. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
161) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16964)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Backup Engine, which leads to security restrictions bypass and privilege escalation.
162) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-17038)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Win32k, which leads to security restrictions bypass and privilege escalation.
163) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-17043)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.
164) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16962)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Backup Engine, which leads to security restrictions bypass and privilege escalation.
165) Information disclosure (CVE-ID: CVE-2020-17140)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows SMB. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
166) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1652)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows CSC Service, which leads to security restrictions bypass and privilege escalation.
167) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1649)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Active Template Library, which leads to security restrictions bypass and privilege escalation.
168) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2021-1640)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a race condition within the Print Spooler service. A local user can create a directory junction and force the Print Spooler service to delete arbitrary files on the system. Successful exploitation of the vulnerability may result in denial of service.
169) Spoofing attack (CVE-ID: CVE-2020-26144)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in Windows Wireless Networking. A remote attacker on the local network can spoof page content.
170) Spoofing attack (CVE-ID: CVE-2020-24588)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in Windows Wireless Networking. A remote attacker on the local network can spoof page content.
171) Information disclosure (CVE-ID: CVE-2020-24587)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Wireless Networking. A remote attacker on the local network can gain unauthorized access to sensitive information on the system.
172) Information disclosure (CVE-ID: CVE-2020-17098)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows GDI+. A local user can gain unauthorized access to sensitive information on the system.
173) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-17044)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.
174) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-17088)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Common Log File System Driver, which leads to security restrictions bypass and privilege escalation.
175) Buffer overflow (CVE-ID: CVE-2020-17087)
The vulnerability allows a local user to escalate privilege son the system.
The vulnerability exists due to a boundary error within the Windows Kernel Cryptography Driver cng.sys, which exposes a "\Device\CNG" device to user-mode programs and supports a variety of IOCTLs with non-trivial input structures. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the system with elevated privileges.
Note, this vulnerability is being actively exploited in the wild.
176) Information disclosure (CVE-ID: CVE-2020-17069)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows NDIS. A local user can gain unauthorized access to sensitive information on the system.
177) Code Injection (CVE-ID: CVE-2020-17068)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Windows GDI+. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
178) Input validation error (CVE-ID: CVE-2020-17047)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Network File System. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
179) Information disclosure (CVE-ID: CVE-2020-17045)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows KernelStream. A local user can gain unauthorized access to sensitive information on the system.
180) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16963)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Backup Engine, which leads to security restrictions bypass and privilege escalation.
181) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16961)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Backup Engine, which leads to security restrictions bypass and privilege escalation.
182) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1654)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows CSC Service, which leads to security restrictions bypass and privilege escalation.
183) Buffer overflow (CVE-ID: CVE-2021-26419)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Scripting Engine. A remote administrator can trick a victim to visit a malicious website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
184) Spoofing attack (CVE-ID: CVE-2020-1599)
The vulnerability allows a local attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in Windows. A local attacker can spoof page content.
185) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-31204)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in .NET and Visual Studio, which leads to security restrictions bypass and privilege escalation.
186) Input validation error (CVE-ID: CVE-2021-31957)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in .NET Core and Visual Studio. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
187) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-34477)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Visual Studio Code .NET Runtime, which leads to security restrictions bypass and privilege escalation.
188) Buffer overflow (CVE-ID: CVE-2020-17052)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Scripting Engine. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
189) Double Free (CVE-ID: CVE-2021-26411)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing ".mht" files. A remote attacker can trick the victim to visit a specially crafted webpage, trigger a double free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note, the vulnerability is being actively exploited in the wild.
190) Improper input validation (CVE-ID: CVE-2021-2341)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Networking component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.
191) Buffer overflow (CVE-ID: CVE-2020-16887)
The vulnerability allows a local user to escalate privilege so the system.
The vulnerability exists due to a boundary error in the Windows Network Connections Service when handling objects in memory. A local user can create a specially crafted application, trigger memory corruption and execute arbitrary code on the target system with elevated privileges.
192) Improper input validation (CVE-ID: CVE-2021-2432)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
The vulnerability exists due to improper input validation within the JNDI component in Java SE. A remote non-authenticated attacker can exploit this vulnerability to perform service disruption.
193) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2021-2369)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to an error in JAR validation implementation. A remote attacker can modify the signed JAR file in a way it will be considered as signed.
194) Infinite loop (CVE-ID: CVE-2020-28928)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the wcsnrtombs() function in musl libc. A remote attacker can consume all available system resources and cause denial of service conditions.
195) Improper input validation (CVE-ID: CVE-2021-2388)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Hotspot component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
196) Improper input validation (CVE-ID: CVE-2021-29921)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Python interpreter and runtime (CPython) component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
197) Input validation error (CVE-ID: CVE-2020-16863)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Remote Desktop Service . A remote attacker can run a specially crafted application and perform a denial of service (DoS) attack.
198) Out-of-bounds read (CVE-ID: CVE-2020-16889)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the Windows KernelStream. A local user can use a specially crafted application to trigger out-of-bounds read error and read contents of memory on the system.
199) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16960)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Backup Engine, which leads to security restrictions bypass and privilege escalation.
200) Buffer overflow (CVE-ID: CVE-2020-16924)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the Windows Jet Database Engine. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
201) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16959)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Backup Engine, which leads to security restrictions bypass and privilege escalation.
202) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16958)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Backup Engine, which leads to security restrictions bypass and privilege escalation.
203) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16940)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way Windows User Profile Service (ProfSvc) handles junction points. A local user can create a malicious application, launch it on the system and delete files and folders in an elevated context.
To exploit this vulnerability, an attacker would first have to log on to the system.
204) Buffer overflow (CVE-ID: CVE-2020-16939)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when Group Policy improperly checks access. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
205) Buffer overflow (CVE-ID: CVE-2020-16936)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when the Windows Backup Service improperly handles file operations. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
206) Buffer overflow (CVE-ID: CVE-2020-16935)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when Windows improperly handles COM object creation. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
207) Buffer overflow (CVE-ID: CVE-2020-16923)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within Microsoft Graphics Components. A remote attacker can send a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
208) Out-of-bounds read (CVE-ID: CVE-2020-16897)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within NetBIOS over TCP (NBT) Extensions (NetBT). A local user can use a specially crafted application to trigger out-of-bounds read error and read contents of memory on the system.
209) Spoofing attack (CVE-ID: CVE-2020-16922)
The vulnerability allows a local attacker to perform spoofing attack.
The vulnerability exists due to Windows incorrectly validates file signatures. A local attacker can spoof page content, bypass security features and load improperly signed files.
210) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16920)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the way Windows Application Compatibility Client Library handles registry operations. A local user can create a malicious application, launch it on the system and gain elevated privileges.
To exploit the vulnerability, an attacker would first need code execution on a victim system.
211) Buffer overflow (CVE-ID: CVE-2020-16916)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when Windows improperly handles COM object creation. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
212) Out-of-bounds read (CVE-ID: CVE-2020-16914)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to the way that the Windows Graphics Device Interface Plus (GDI+) handles objects in memory. A local user can use a specially crafted application, trigger out-of-bounds read error and read contents of memory on the system.
213) Buffer overflow (CVE-ID: CVE-2020-16912)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when the Windows Backup Service improperly handles file operations. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
214) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-16902)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior. A local user can run arbitrary code with elevated system privileges.
215) Buffer overflow (CVE-ID: CVE-2020-16900)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error when the Windows Event System improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
216) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1653)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows CSC Service, which leads to security restrictions bypass and privilege escalation.
217) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1655)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows CSC Service, which leads to security restrictions bypass and privilege escalation.
218) Information disclosure (CVE-ID: CVE-2021-28317)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Microsoft Windows Codecs Library. A local user can gain unauthorized access to sensitive information on the system.
219) Security features bypass (CVE-ID: CVE-2021-26414)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Windows DCOM Server. A remote authenticated attacker can gain elevated privileges on the target system.
220) Information disclosure (CVE-ID: CVE-2021-26869)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows ActiveX Installer Service. A remote attacker can gain unauthorized access to sensitive information on the system.
221) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26862)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Installer, which leads to security restrictions bypass and privilege escalation.
222) Code Injection (CVE-ID: CVE-2021-26861)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in Windows Graphics Component. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
223) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26425)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Event Tracing, which leads to security restrictions bypass and privilege escalation.
224) Buffer overflow (CVE-ID: CVE-2021-26424)
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in tcpip.sys when processing TCP/IP packets sent via IPv6 protocol. A remote Hyper-V guest can send a specially crafted IPv6 ping to the affected Hyper-V host, trigger memory corruption and execute arbitrary code on the system.
225) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26415)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Installer, which leads to security restrictions bypass and privilege escalation.
226) Spoofing attack (CVE-ID: CVE-2021-26413)
The vulnerability allows a local attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in the Windows Installer. A local attacker can spoof page content.
227) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26873)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows User Profile Service, which leads to security restrictions bypass and privilege escalation.
228) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-25195)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows PKU2U, which leads to security restrictions bypass and privilege escalation.
229) Information disclosure (CVE-ID: CVE-2021-24107)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows Event Tracing. A local user can gain unauthorized access to sensitive information on the system.
230) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-24103)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Event Tracing, which leads to security restrictions bypass and privilege escalation.
231) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-24102)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Event Tracing, which leads to security restrictions bypass and privilege escalation.
232) Input validation error (CVE-ID: CVE-2021-24094)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows TCP/IP. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
233) Input validation error (CVE-ID: CVE-2021-24088)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Local Spooler. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
234) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26872)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Event Tracing, which leads to security restrictions bypass and privilege escalation.
235) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26875)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Win32k, which leads to security restrictions bypass and privilege escalation.
236) Input validation error (CVE-ID: CVE-2021-24083)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Address Book. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
237) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-27091)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the RPC Endpoint Mapper Service, which leads to security restrictions bypass and privilege escalation.
238) Security features bypass (CVE-ID: CVE-2021-28316)
The vulnerability allows a local attacker to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Windows WLAN AutoConfig Service. An attacker with physical access can gain access to sensitive information on the system.
239) Code Injection (CVE-ID: CVE-2021-28315)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows Media Video Decoder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
240) Information disclosure (CVE-ID: CVE-2021-28309)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows Kernel. A local user can gain unauthorized access to sensitive information on the system.
241) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-27096)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in NTFS, which leads to security restrictions bypass and privilege escalation.
242) Code Injection (CVE-ID: CVE-2021-27095)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Windows Media Video Decoder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
243) Information disclosure (CVE-ID: CVE-2021-27093)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Windows Kernel. A local user can gain unauthorized access to sensitive information on the system.
244) Code Injection (CVE-ID: CVE-2021-27089)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Microsoft Internet Messaging API. A remote attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
245) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26878)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
246) Untrusted Pointer Dereference (CVE-ID: CVE-2021-27077)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to untrusted pointer dereference in multiple functions within win32kfull.sys driver. A local user can run a specially crafted program to trigger untrusted pointer dereference and execute arbitrary code with SYSTEM privileges.
247) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26901)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Event Tracing, which leads to security restrictions bypass and privilege escalation.
248) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26899)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows UPnP Device Host, which leads to security restrictions bypass and privilege escalation.
249) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26898)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Event Tracing, which leads to security restrictions bypass and privilege escalation.
250) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26887)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Microsoft Windows Folder Redirection, which leads to security restrictions bypass and privilege escalation.
251) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-26882)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in the Windows Remote Access API, which leads to security restrictions bypass and privilege escalation.
252) Code Injection (CVE-ID: CVE-2021-26881)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in the Microsoft Windows Media Foundation. A remote authenticated attacker can send a specially crafted request and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
253) Input validation error (CVE-ID: CVE-2021-24086)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows TCP/IP. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
254) Input validation error (CVE-ID: CVE-2021-24080)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Trust Verification API. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
255) Information disclosure (CVE-ID: CVE-2021-1656)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in TPM Device Driver. A local user can gain unauthorized access to sensitive information on the system.
256) Input validation error (CVE-ID: CVE-2021-1666)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
257) Code Injection (CVE-ID: CVE-2021-1675)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation within the Windows Print Spooler service. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note, this is a description of the original vulnerability fixed by Microsoft on June 9, 2021. A different vulnerability than #VU53886 (CVE-2021-34527) for which an exploit was made publicly available.
258) Security Features (CVE-ID: CVE-2021-1674)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to security feature bypass issue in Windows Remote Desktop Protocol Core. A remote authenticated attacker can gain unauthorized access to the application.
259) Input validation error (CVE-ID: CVE-2021-1673)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
260) Input validation error (CVE-ID: CVE-2021-1671)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
261) Input validation error (CVE-ID: CVE-2021-1668)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Microsoft DTV-DVD Video Decoder. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
262) Input validation error (CVE-ID: CVE-2021-1667)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
263) Input validation error (CVE-ID: CVE-2021-1665)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in GDI+. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
264) Information disclosure (CVE-ID: CVE-2021-1678)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application within the NTLM implementation in Microsoft Windows. A remote attacker can trick the victim to follow a specially crafted link and gain access to sensitive information.
265) Input validation error (CVE-ID: CVE-2021-1664)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
266) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1661)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Installer, which leads to security restrictions bypass and privilege escalation.
267) Input validation error (CVE-ID: CVE-2021-1660)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
268) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1659)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows CSC Service, which leads to security restrictions bypass and privilege escalation.
269) Input validation error (CVE-ID: CVE-2021-1658)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
270) Input validation error (CVE-ID: CVE-2021-1657)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Fax Compose Form. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
271) Information disclosure (CVE-ID: CVE-2021-1676)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows NT Lan Manager Datagram Receiver Driver. A local user can gain unauthorized access to sensitive information on the system.
272) Input validation error (CVE-ID: CVE-2021-1679)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in Windows CryptoAPI. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
273) Input validation error (CVE-ID: CVE-2021-24077)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Fax Service. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
274) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1706)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows LUAFV, which leads to security restrictions bypass and privilege escalation.
275) Input validation error (CVE-ID: CVE-2021-24074)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows TCP/IP. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
276) Information disclosure (CVE-ID: CVE-2021-1734)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Remote Procedure Call. A remote attacker can gain unauthorized access to sensitive information on the system.
277) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1727)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Installer, which leads to security restrictions bypass and privilege escalation.
278) Input validation error (CVE-ID: CVE-2021-1722)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Windows Fax Service. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
279) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1709)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.
280) Information disclosure (CVE-ID: CVE-2021-1708)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
281) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1702)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Remote Procedure Call Runtime, which leads to security restrictions bypass and privilege escalation.
282) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1688)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows CSC Service, which leads to security restrictions bypass and privilege escalation.
283) Input validation error (CVE-ID: CVE-2021-1701)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
284) Input validation error (CVE-ID: CVE-2021-1700)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Remote Procedure Call Runtime. A remote authenticated attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
285) Information disclosure (CVE-ID: CVE-2021-1699)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows (modem.sys). A local user can gain unauthorized access to sensitive information on the system.
286) Information disclosure (CVE-ID: CVE-2021-1696)
The vulnerability allows a local attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Graphics Component. A local attacker can gain unauthorized access to sensitive information on the system.
287) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1695)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Print Spooler, which leads to security restrictions bypass and privilege escalation.
288) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1694)
The vulnerability allows a remote attacker on the local network to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows Update Stack, which leads to security restrictions bypass and privilege escalation.
289) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-1693)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions in Windows CSC Service, which leads to security restrictions bypass and privilege escalation.
Remediation
Install update from vendor's website.