Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Total 21366 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-26427 1 Microsoft 1 Exchange Server 2024-11-21 5.8 MEDIUM 9.0 CRITICAL
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2021-26426 1 Microsoft 7 Windows 10, Windows 7, Windows 8.1 and 4 more 2024-11-21 4.6 MEDIUM 7.0 HIGH
Windows User Account Profile Picture Elevation of Privilege Vulnerability
CVE-2021-26425 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Event Tracing Elevation of Privilege Vulnerability
CVE-2021-26424 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 6.8 MEDIUM 9.9 CRITICAL
Windows TCP/IP Remote Code Execution Vulnerability
CVE-2021-26423 1 Microsoft 5 .net, .net Core, Powershell Core and 2 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
.NET Core and Visual Studio Denial of Service Vulnerability
CVE-2021-26422 1 Microsoft 2 Lync Server, Skype For Business Server 2024-11-21 6.5 MEDIUM 7.2 HIGH
Skype for Business and Lync Remote Code Execution Vulnerability
CVE-2021-26421 1 Microsoft 2 Lync Server, Skype For Business Server 2024-11-21 5.8 MEDIUM 6.5 MEDIUM
Skype for Business and Lync Spoofing Vulnerability
CVE-2021-26420 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 6.5 MEDIUM 7.1 HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2021-26419 1 Microsoft 9 Internet Explorer, Windows 10, Windows 7 and 6 more 2024-11-21 7.6 HIGH 7.5 HIGH
Scripting Engine Memory Corruption Vulnerability
CVE-2021-26417 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2024-11-21 2.1 LOW 5.5 MEDIUM
Windows Overlay Filter Information Disclosure Vulnerability
CVE-2021-26416 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2024-11-21 7.8 HIGH 7.7 HIGH
Windows Hyper-V Denial of Service Vulnerability
CVE-2021-26415 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Installer Elevation of Privilege Vulnerability
CVE-2021-26414 1 Microsoft 10 Windows 10, Windows 7, Windows 8.1 and 7 more 2024-11-21 4.3 MEDIUM 4.8 MEDIUM
Windows DCOM Server Security Feature Bypass
CVE-2021-26413 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 2.1 LOW 6.2 MEDIUM
Windows Installer Spoofing Vulnerability
CVE-2021-26412 1 Microsoft 1 Exchange Server 2024-11-21 6.5 MEDIUM 9.1 CRITICAL
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2021-26334 3 Amd, Linux, Microsoft 3 Amd Uprof, Linux Kernel, Windows 2024-11-21 9.0 HIGH 9.9 CRITICAL
The AMDPowerProfiler.sys driver of AMD µProf tool may allow lower privileged users to access MSRs in kernel which may lead to privilege escalation and ring-0 code execution by the lower privileged user.
CVE-2021-25265 2 Microsoft, Sophos 2 Windows, Connect 2024-11-21 6.8 MEDIUM 8.8 HIGH
A malicious website could execute code remotely in Sophos Connect Client before version 2.1.
CVE-2021-25261 2 Microsoft, Yandex 2 Windows, Yandex Browser 2024-11-21 7.2 HIGH 7.8 HIGH
Local privilege vulnerability in Yandex Browser for Windows prior to 22.5.0.862 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process.
CVE-2021-25252 7 Apple, Emc, Linux and 4 more 25 Macos, Celerra Network Attached Storage, Linux Kernel and 22 more 2024-11-21 4.9 MEDIUM 5.5 MEDIUM
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
CVE-2021-25251 2 Microsoft, Trendmicro 9 Windows, Antivirus\+ Security 2020, Antivirus\+ Security 2021 and 6 more 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability.