Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

1,542

Total CVEs

1,542

CISA KEV

35

Known Exploits

9.3

Avg CVSS Score

Severity Distribution

HIGH 1542

Showing 20 of 418 CVEs matching "Microsoft" · CISA KEV

CVE-2020-0796KEV
High

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.

MicrosoftEPSS 94.4%
CVE-2017-0263KEV
High

Microsoft Win32k contains a privilege escalation vulnerability due to the Windows kernel-mode driver failing to properly handle objects in memory.

MicrosoftEPSS 17.8%
CVE-2017-0144KEV
High

The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.

MicrosoftEPSS 94.3%
CVE-2017-8464KEV
High

Windows Shell in multiple versions of Microsoft Windows allows local users or remote attackers to execute arbitrary code via a crafted .LNK file

MicrosoftEPSS 93.9%
CVE-2017-0145KEV
High

The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.

MicrosoftEPSS 93.3%
CVE-2017-0262KEV
High

A remote code execution vulnerability exists in Microsoft Office.

MicrosoftEPSS 65.1%
CVE-2015-1635KEV
High

Microsoft HTTP protocol stack (HTTP.sys) contains a vulnerability that allows for remote code execution.

MicrosoftEPSS 94.3%
CVE-2022-21882KEV
High

Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

MicrosoftEPSS 89.4%
CVE-2014-1776KEV
High

Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code in the context of the current user.

MicrosoftEPSS 80.2%
CVE-2020-0787KEV
High

Microsoft Windows BITS is vulnerable to to a privilege elevation vulnerability if it improperly handles symbolic links. An actor can exploit this vulnerability to execute arbitrary code with system-level privileges.

MicrosoftEPSS 60.8%
CVE-2018-8453KEV
High

Microsoft Windows Win32k contains a vulnerability that allows an attacker to escalate privileges.

MicrosoftEPSS 78.2%
CVE-2021-33766KEV
High

Microsoft Exchange Server contains an information disclosure vulnerability which can allow an unauthenticated attacker to steal email traffic from target.

MicrosoftEPSS 93.7%
CVE-2013-3900KEV
High

A remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for PE files.

MicrosoftEPSS 80.2%
CVE-2019-1458KEV
High

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k EoP.

MicrosoftEPSS 91.9%
CVE-2021-4102KEV
High

Google Chromium V8 Engine contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 4.4%
CVE-2021-43890KEV
High

Microsoft Windows AppX Installer contains a spoofing vulnerability which has a high impacts to confidentiality, integrity, and availability.

MicrosoftEPSS 16.4%
CVE-2021-42321KEV
High

An authenticated attacker could leverage improper validation in cmdlet arguments within Microsoft Exchange and perform remote code execution.

MicrosoftEPSS 93.4%
CVE-2021-42292KEV
High

A security feature bypass vulnerability in Microsoft Excel would allow a local user to perform arbitrary code execution.

MicrosoftEPSS 19.1%
CVE-2021-40449KEV
High

Unspecified vulnerability allows for an authenticated user to escalate privileges.

MicrosoftEPSS 91.1%
CVE-2020-0938KEV
High

Microsoft Windows Adobe Font Manager Library contains an unspecified vulnerability when handling specially crafted multi-master fonts (Adobe Type 1 PostScript format) that allows for remote code execution for all systems except Windows 10. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities.

MicrosoftEPSS 89.6%