Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Microsoft
  4. Windows Defender antimalware platform
  5. 4.18.2001.111

Known Vulnerabilities in Windows Defender antimalware platform 4.18.2001.111

Show more ↓
4.18.25050.5
4.18.25040.2
4.18.25030.2
4.18.25020.1009
4.18.25010.11
4.18.25010
4.18.24090.11
4.18.24090.4
4.18.24090.2
4.18.24080.9
4.18.24070.5
4.18.24060.7
4.18.24060
4.18.24050.7
4.18.24040.4
4.18.24030.9
4.18.24020.7
4.18.24010.12
4.18.23110.3
4.18.23100.2009
4.18.23090.2008
4.18.23080.2006
4.18.23070.1004
4.18.23050.9
4.18.23050.5
4.18.23050.3
4.18.2304.8
4.18.2303.8
4.18.2302.7
4.18.2301.6
4.18.2211.5
4.18.2210.6
4.18.2210.5
4.18.2210.4
4.18.2209.7
4.18.2207.7
4.18.2205.7
4.18.2203.5
4.18.2202.4
4.18.2201.10
4.18.2111.5
4.18.2110.6
4.18.2109.6
4.18.2107.4
4.18.2105.5
4.18.2104.14
4.18.2103.7
4.18.2102.4
4.18.2101.9
4.18.2011.6
4.18.2010.7
4.18.2009.7
4.18.2008.9
4.18.2001.112
4.18.2001.111
4.18.1909.6
4.18.1902.5
4.18.1807.18075
4.18.1807.5
4.13.17134.1
4.12.16299.15
4.11.15603.2
4.10.14393.3683
1.1.23060.3001
0.0
-



Privilege escalation in Microsoft Windows Defender Antimalware Platform14 Apr, 2020
Low Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Cyber Security Week in Review: July 4, 2025
  • AI chatbots fall for phishing scams
  • Chinese hackers exploited Ivanti flaws in attacks against French government
  • Threat actors exploit Vercel's AI tool v0 to build sophisticated phishing pages
  • Qantas alerts customers to potential data breach after third-party cyberattack
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.