Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

1,542

Total CVEs

1,542

CISA KEV

35

Known Exploits

9.3

Avg CVSS Score

Severity Distribution

HIGH 1542

Showing 20 of 418 CVEs matching "Microsoft" · HIGH

CVE-2015-2545KEV
High

Microsoft Office allows remote attackers to execute arbitrary code via a crafted EPS image.

MicrosoftEPSS 93.4%
CVE-2013-3897KEV
High

A use-after-free vulnerability exists within CDisplayPointer in Microsoft Internet Explorer that allows an attacker to remotely execute arbitrary code.

MicrosoftEPSS 88.2%
CVE-2015-2387KEV
High

ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server allows local users to gain privileges via a crafted application.

MicrosoftEPSS 31.2%
CVE-2011-1889KEV
High

A remote code execution vulnerability exists in the Forefront Threat Management Gateway (TMG) Firewall Client Winsock provider that could allow code execution in the security context of the client application.

MicrosoftEPSS 85.4%
CVE-2010-3333KEV
High

A stack-based buffer overflow vulnerability exists in the parsing of RTF data in Microsoft Office and earlier allows an attacker to perform remote code execution.

MicrosoftEPSS 93.8%
CVE-2013-1347KEV
High

This vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer.

MicrosoftEPSS 88.0%
CVE-2012-1856KEV
High

The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption.

MicrosoftEPSS 91.9%
CVE-2010-0232KEV
High

The kernel in Microsoft Windows, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges.

MicrosoftEPSS 72.6%
CVE-2004-0210KEV
High

A privilege elevation vulnerability exists in the POSIX subsystem. This vulnerability could allow a logged on user to take complete control of the system.

MicrosoftEPSS 3.7%
CVE-2014-4114KEV
High

A vulnerability exists in Windows Object Linking & Embedding (OLE) that could allow remote code execution if a user opens a file that contains a specially crafted OLE object.

MicrosoftEPSS 92.1%
CVE-2016-0099KEV
High

A privilege escalation vulnerability exists in Microsoft Windows if the Windows Secondary Logon Service fails to properly manage request handles in memory. An attacker who successfully exploited this vulnerability could run arbitrary code as an administrator.

MicrosoftEPSS 90.4%
CVE-2017-8570KEV
High

A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory.

MicrosoftEPSS 94.2%
CVE-2017-0222KEV
High

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.

MicrosoftEPSS 62.0%
CVE-2014-6352KEV
High

Microsoft Windows allow remote attackers to execute arbitrary code via a crafted OLE object.

MicrosoftEPSS 90.7%
CVE-2019-0752KEV
High

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer

MicrosoftEPSS 92.0%
CVE-2014-1761KEV
High

Microsoft Word contains a memory corruption vulnerability which when exploited could allow for remote code execution.

MicrosoftEPSS 93.1%
CVE-2018-8174KEV
High

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution"

MicrosoftEPSS 94.3%
CVE-2013-3906KEV
High

Microsoft Graphics Component contains a memory corruption vulnerability which can allow for remote code execution.

MicrosoftEPSS 92.7%
CVE-2022-0609KEV
High

Google Chromium Animation contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 39.5%
CVE-2021-36934KEV
High

If a Volume Shadow Copy (VSS) shadow copy of the system drive is available, users can read the SAM file which would allow any user to escalate privileges to SYSTEM level.

MicrosoftEPSS 89.9%