Recent High and Critical vulnerabilities for which exploits are available

Excel download

Over 90% of successful attacks today could have been prevented by applying a patch. In most cases, these patches were available for over a year. Applying patches is the single most effective risk mitigation strategy organizations can implement.

However, most of the published vulnerabilities are not being exploited 'in the wild'. The availability of exploit code is therefore an important factor to decide which patches should be prioritized*.

CVE Vendor Title Included CVSS V2/V3 Base Score Description
??CVE-2021-44228 Apache Remote code execution vulnerability in Apache Log4j 13/12/2021 10 Remote code execution vulnerability in Apache Log4j. It is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.
CVE-2020-1472 Microsoft Netlogon Elevation of Privilege Vulnerability 16/09/2020 10 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.
CVE 2020-1350 Microsoft Windows DNS Server Remote Code Execution Vulnerability 16/07/2020 10 A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. Windows servers that are configured as DNS servers are at risk from this vulnerability. To exploit the vulnerability, an unauthenticated attacker could send malicious
CVE-2020-12388 Mozilla Firefox Default Content Process DACL Sandbox Escape 26/06/2020 10 The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR versions lower than 68.8 and Firefox versions lower than 76.
CVE-2020-3765? Adobe Adobe After Effects Out-of-Bounds Write Vulnerability (APSB20-09)? 21/05/2020 10 Adobe After Effects have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.?
CVE-2020-0609 Microsoft Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability 21/05/2020 10 A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system.
CVE-2020-0796 Microsoft Microsoft Windows SMBv3 Client/Server Remote Code Execution Vulnerability 21/05/2020 10 A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.
CVE-2021-17095 Microsoft Hyper-V Remote Code Execution Vulnerability 26/02/2021 9.9 A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit this vulnerability, an attacker could run a specially crafted application on a Hyper-V guest that could cause the Hyper-V host operating system to execute arbitrary code when it fails to properly validate vSMB packet data.
CVE-2023-46604 Apache Apache ActiveMQ is vulnerable to Remote Code Execution 16/11/2023 9.8 Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath. Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue.
CVE-2023-41993 Apple Processing web content may lead to arbitrary code execution 16/11/2023 9.8 The issue was addressed with improved checks. This issue is fixed in Safari 17 and macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
CVE-2024-21413 Microsoft Microsoft Outlook Remote Code Execution Vulnerability 27/02/2024 9.8 Microsoft Outlook Remote Code Execution Vulnerability. More information on: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413
CVE-2023-23397 Microsoft Microsoft Outlook Elevation of Privilege Vulnerability 28/03/2023 9.8 Critical privilege elevation/authentication bypass vulnerability in Outlook. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397
CVE-2021-28480 Microsoft Microsoft Exchange Server Remote Code Execution Vulnerability 20/05/2021 9.8 Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28481, CVE-2021-28482, CVE-2021-28483.
CVE-2020-27955 Git/GitHub Git Large File Storage / Git LFS (git-lfs) - Remote Code Execution (RCE) 09/12/2020 9.8 Git LFS 2.12.0 allows Remote Code Execution.
CVE-2020-17051 Microsoft Windows Network File System Remote Code Execution Vulnerability 13/11/2020 9.8 Windows Network File System Remote Code Execution Vulnerability
CVE-2020-16898 Microsoft Windows TCP/IP Remote Code Execution Vulnerability 23/10/2020 9.8 A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP Remote Code Execution Vulnerability'.
CVE-2019-0708 Microsoft Remote Desktop Services Remote Code Execution Vulnerability 24/09/2020 9.8 A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability
CVE-2019-19781 Citrix Vulnerability in Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance 24/09/2020 9.8 An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.
CVE-2019-1181 Microsoft Remote Desktop Services Remote Code Execution Vulnerability 24/09/2020 9.8 "A remote code execution vulnerability exists in Remote Desktop Services (formerly known as Terminal Services) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka ""Remote Desktop Services Remote Code Execution Vulnerability"". This CVE ID is unique from CVE-2019-1182, CVE-2019-1222, CVE-2019-1226."
CVE-2019-1182 Microsoft Remote Desktop Services Remote Code Execution Vulnerability 24/09/2020 9.8 "A remote code execution vulnerability exists in Remote Desktop Services (formerly known as Terminal Services) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka ""Remote Desktop Services Remote Code Execution Vulnerability"". This CVE ID is unique from CVE-2019-1181, CVE-2019-1222, CVE-2019-1226."
CVE-2018-4878 Adobe Adobe Flash Player Use After Free Remote Code Execution Vulnerability 21/05/2020 9.8 A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution.
CVE-2019-0604 Microsoft Microsoft Sharepoint Remote Code Execution Vulnerability 21/05/2020 9.8 A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package
CVE 2019-16452 Adobe Adobe User After Free Arbitrary Code Execution Vulnerability 28/05/2020 9.8 Adobe Acrobat and Reader versions , 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2023-2136 Google Memory corruption. Integer overflow in Skia 17/05/2023 9.6 Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High). https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html
CVE-2022-4135 Google Heap buffer overflow in GPU 28/03/2023 9.6 https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_24.html
CVE-2023-6345 Google Integer overflow in Skia in Google Chrome 27/02/2024 9.6 Integer overflow in Skia in Google Chrome prior to 119.0.6045.199 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a malicious file.
CVE-2020-6457 Google Use after free in speech recognizer in Google Chrome 29/01/2021 9.6 Use after free in speech recognizer in Google Chrome prior to 81.0.4044.113 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
CVE-2021-26855 Microsoft Microsoft Exchange Server Remote Code Execution Vulnerability 03/03/2021 9.1 Server-side request forgery (SSRF) vulnerability in Exchange which allows the attacker to send arbitrary HTTP requests and authenticate as the Exchange server. Check for details here: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
CVE-2021-30563 Google Type Confusion in V8 16/07/2021 9 https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.html
CVE-2020-0665 Microsoft Microsoft Active Directory Privilege Escalation Vulnerability 21/05/2020 9 The vulnerability exists in Active Directory Forest trust due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest. The vulnerability allows a remote user to escalate privileges on the system. A remote user can gain elevated privileges on the target system.?
CVE-2023-36884 Microsoft Office and Windows HTML Remote Code Execution 16/11/2023 8.8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884
CVE-2023-4863 Google Out of bounds memory write via a crafted HTML page 16/11/2023 8.8 Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
CVE-2023-7024 Google Heap buffer overflow in WebRTC in Google Chrome 27/02/2024 8.8 Heap buffer overflow in WebRTC in Google Chrome prior to 120.0.6099.129 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2024-5219 Google Out of bounds memory write via a crafted HTML page 27/02/2024 8.8 Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2023-5217 Google Heap corruption via a crafted HTML page 16/11/2023 8.8 Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2023-4762 Google Type confusion in V8 in Google Chrome 16/11/2023 8.8 Type Confusion in V8 in Google Chrome prior to 116.0.5845.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
CVE-2023-3079 Google Type confusion in V8 in Google Chrome 16/11/2023 8.8 Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2023-42917 Apple Processing web content may lead to arbitrary code execution 27/02/2024 8.8 A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Sonoma 14.1.2 and Safari 17.1.2. Processing web content may lead to arbitrary code execution.
CVE-2024-23222 Apple Processing maliciously crafted web content may lead to arbitrary code execution 27/02/2024 8.8 A type confusion issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.3, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2023-37450 Apple Processing web content may lead to arbitrary code execution 16/11/2023 8.8 The issue was addressed with improved checks. This issue is fixed in Safari 16.5.2 and macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.
CVE-2023-32439 Apple Processing maliciously crafted web content may lead to arbitrary code execution 16/11/2023 8.8 A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.4.1 and Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2023-32435 Apple Processing web content may lead to arbitrary code execution 16/11/2023 8.8 A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3 and Safari 16.4. Processing web content may lead to arbitrary code execution.
CVE-2023-32373 Apple Processing maliciously crafted web content may lead to arbitrary code execution 16/11/2023 8.8 A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura and Safari 16.5. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2023-2033 Google Type confusion in V8 in Google Chrome 18/04/2023 8.8 Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High). https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_14.html
CVE-2023-21674 Microsoft ALPC elevation of privilege 28/03/2023 8.8 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21674
CVE-2022-4262 Google Type confusion in V8 28/03/2023 8.8 https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop.html
CVE-2022-2294 Google Buffer overflow in WebRTC 15/11/2022 8.8 Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-3723 Google Type confusion in V8 15/11/2022 8.8 Type confusion in V8 in Google Chrome prior to 107.0.5304.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2022-41040 Microsoft Server-side request forgery 15/11/2022 8.8 Microsoft Exchange Server Elevation of Privilege Vulnerability.
CVE-2022-41082 Microsoft Remote code execution 15/11/2022 8.8 Microsoft Exchange Server Remote Code Execution Vulnerability.
CVE-2022-41128 Microsoft JScript9 remote code execution 15/11/2022 8.8 Windows Scripting Languages Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41118.
CVE-2021-42321 Microsoft Microsoft Exchange Server Remote Code Execution Vulnerability 19/11/2021 8.8 "Post-authentication vulnerability in Exchange 2016 and 2019. More information:
CVE-2021-40444 Microsoft Microsoft MSHTML Remote Code Execution Vulnerability 24/09/2021 8.8 An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
CVE-2021-34527 Microsoft Windows Print Spooler Remote Code Execution Vulnerability 07/07/2021 8.8 "A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights."
CVE-2021-21166 Google Heap corruption via a crafted HTML page in Google Chrome prior to 89.0.4389.72 04/05/2021 8.8 Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-16898 Microsoft Windows TCP/IP Remote Code Execution Vulnerability 04/05/2021 8.8 A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client. To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The update addr
CVE-2021-26411 Microsoft Internet Explorer Memory Corruption Vulnerability 17/03/2021 8.8 An attacker could host a specially crafted website designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. However, in all cases an attacker would have no wa
CVE-2021-21193 Google Use after free in Blink in Google Chrome vulnerability 17/03/2021 8.8 Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21017 Adobe Adobe Reader Heap-based buffer overflow vulnerability 19/02/2021 8.8 "Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2020-3495 Cisco Cisco Jabber for Windows Message Handling Arbitrary Code Execution Vulnerability 11/09/2020 8.8 A vulnerability in Cisco Jabber for Windows could allow an authenticated, remote attacker to execute arbitrary code. The vulnerability is due to improper validation of message contents. An attacker could exploit this vulnerability by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages to the affected software. A successful exploit could allow the attacker to ca
CVE-2020-0688 Microsoft Microsoft Exchange Memory Corruption Vulnerability 21/05/2020 8.8 A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory. Knowledge of a the validation key allows an authenticated user with a mailbox to pass arbitrary objects to be deserialized by the web application, which runs as SYSTEM.
CVE-2020-1181 Microsoft Microsoft SharePoint Server Remote Code Execution Vulnerability 25/06/2020 8.8 A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.Net web controls. An authenticated attacker who successfully exploited the vulnerability could use a specially crafted page to perform actions in the security context of the SharePoint application pool process. To exploit the vulnerability, an authenticated user must create a
CVE-2020-3947 VMWare VMWare Workstation vmnetdhcp Denial of Service Vulnerability 21/05/2020 8.8 VMware Workstation contain a use-after vulnerability in vmnetdhcp. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial of service condition of the vmnetdhcp service running on the host machine.
CVE-2023-32409 Apple A remote attacker may be able to break out of Web Content sandbox 16/11/2023 8.6 The issue was addressed with improved bounds checks. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.8 and iPadOS 15.7.8, Safari 16.5, iOS 16.5 and iPadOS 16.5. A remote attacker may be able to break out of Web Content sandbox.
CVE-2023-28206 macOS Out-of-bounds write in IOSurfaceAccelerator 16/11/2023 8.6 An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, macOS Ventura 13.3.1, and macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges.
CVE-2021-33739 Microsoft Microsoft DWM Core Library Elevation of Privilege Vulnerability 09/06/2021 8.4 This vulnerability is subject to a local escalation of privilege attack. The attacker would most likely arrange to run an executable or script on the local computer. An attacker could gain access to the computer through a variety of methods, such as via a phishing attack where a user clicks an executable file that is attached to an email.
CVE-2020-16875 Microsoft Microsoft Exchange Server Remote Code Execution Vulnerability 13/11/2020 8.4 Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2022-26925 Microsoft Windows LSA Spoofing Vulnerability 27/05/2022 8.1 An unauthenticated attacker could call a method on the LSARPC interface and coerce the domain controller to authenticate to the attacker using NTLM. This security update detects anonymous connection attempts in LSARPC and disallows it. Please see ADV210003 Mitigating NTLM Relay Attacks on Active Directory Certificate Services (AD CS). Please see KB5005413 for more information on the steps that you need to take to protect your system
CVE-2020-1013 Microsoft Group Policy Elevation of Privilege Vulnerability 29/10/2020 8.1 An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine. To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and th
CVE-2017-0143 Microsoft Microsoft SMB Remote Code Execution Vulnerability 21/05/2020 8.1 "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka ""Windows SMB Remote Code Execution Vulnerability."""
CVE-2017-0144 Microsoft Windows SMB Remote Code Execution Vulnerability 24/09/2020 8.1 "The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka ""Windows SMB Remote Code Execution Vulnerability."" This vulnerability is different from those described in CVE-2017-0143, CV
CVE-2022-1364 Google Type confusion in the Chrome V8 JavaScript engine. 18/04/2022 8.0 https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_14.html
CVE-2022-1096 Google Type confusion weakness in the Chrome V8 JavaScript engine. 28/03/2022 8.0 https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_25.html
CVE-2022-0609 Google Use after free in Animation 22/02/2022 8.0 https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
CVE-2021-38000 Google Insufficient validation of untrusted input in Intents 29/10/2021 8.0 An insufficient validation of untrusted input security issue has been found in the Intents component of the Chromium browser engine before version 95.0.4638.69.
CVE-2021-21148 Google Heap buffer overflow in V8 10/02/2021 8.0 "Heap buffer overflow vulnerability in V8, Google Chrome s open-source JavaScript and WebAssembly engine. Fixed by Google with an update to the Stable channel to version 88.0.4324.150. NOTE: no CVSS score has been assigned yet for this vulnerability, although Google has labeled it as ""high severity"". We have provisionally set a score of 8.0 to simplify prioritization. "
CVE-2023-28252 Microsoft Windows Common Log File System Driver Elevation of Privilege Vulnerability 12/04/2023 7.8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252
CVE-2023-21823 Microsoft Windows Graphics Component RCE 28/03/2023 7.8 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21823
CVE-2023-23376 Microsoft Common Log File System Driver EoP 28/03/2023 7.8 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23376
CVE-2023-26369 Adobe Out-of-bounds write vulnerability that could result in arbitrary code execution 16/11/2023 7.8 Acrobat Reader versions 23.003.20284 (and earlier), 20.005.30516 (and earlier) and 20.005.30514 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVE-2023-41064 Apple Processing a maliciously crafted image may lead to arbitrary code execution 16/11/2023 7.8 A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution.
CVE-2023-41990 Apple Processing a font file may lead to arbitrary code execution 16/11/2023 7.8 The issue was addressed with improved handling of caches. This issue is fixed in macOS Monterey 12.6.8, macOS Big Sur 11.7.9, and macOS Ventura 13.2. Processing a font file may lead to arbitrary code execution.
CVE-2023-32434 Apple Integer overflow 16/11/2023 7.8 An integer overflow was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.7.8, macOS Monterey 12.6.7, and macOS Ventura 13.4.1.
CVE-2023-36802 Microsoft Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability 16/11/2023 7.8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802
CVE-2023-32046 Microsoft Windows MSHTML Platform Elevation of Privilege Vulnerability 16/11/2023 7.8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32046
CVE-2023-36874 Microsoft Windows Error Reporting Service Elevation of Privilege Vulnerability 16/11/2023 7.8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874
CVE-2023-29336 Microsoft Win32k Elevation of Privilege 16/11/2023 7.8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336
CVE-2023-21768 Microsoft Windows Ancillary Function Driver for WinSock Elevation of Privilege 16/11/2023 7.8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21768
CVE-2022-22047 Microsoft CSRSS Elevation of Privilege 12/07/2022 7.8 Windows CSRSS Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22026, CVE-2022-22049.
CVE-2022-41033 Microsoft COM+ event system service elevation of privilege 11/10/2022 7.8 Windows COM+ Event System Service Elevation of Privilege Vulnerability.
CVE-2022-41125 Microsoft CNG Key Isolation Service elevation of privilege 08/11/2022 7.8 Windows CNG Key Isolation Service Elevation of Privilege Vulnerability.
CVE-2022-30190 Microsoft Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability 06/06/2022 7.8 A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user s
CVE-2021-42292 Microsoft Microsoft Excel Security Feature Bypass Vulnerability 19/11/2021 7.8 "More information on:
CVE-2021-40449 Microsoft Win32k Elevation of Privilege Vulnerability 13/10/2021 7.8 Win32k Elevation of Privilege Vulnerability. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40449
CVE-2021-33771 Microsoft Windows Kernel Elevation of Privilege Vulnerability 16/07/2021 7.8 Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31979, CVE-2021-34514.
CVE-2021-26868 Microsoft Windows Graphics Component Elevation of Privilege Vulnerability 07/07/2021 7.8 Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2021-31956 Microsoft Windows NTFS Elevation of Privilege Vulnerability 09/06/2021 7.8 To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant me
CVE-2021-31167 Microsoft Windows Container Manager Service Elevation of Privilege Vulnerability 20/05/2021 7.8 Windows Container Manager Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31165, CVE-2021-31168, CVE-2021-31169, CVE-2021-31208.
CVE-2021-28310 Microsoft Win32k Elevation of Privilege Vulnerability 04/05/2021 7.8 Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-27072.
CVE-2021-1732 Microsoft Windows Win32k Elevation of Privilege Vulnerability 12/02/2021 7.8 https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1732. For a technical analysis, you can visit https://attackerkb.com/topics/7eGGM4Xknz/cve-2021-1732
CVE-2021-26857 Microsoft Microsoft Exchange Server Remote Code Execution Vulnerability 03/03/2021 7.8 Insecure deserialization vulnerability in the Unified Messaging service. Insecure deserialization is where untrusted user-controllable data is deserialized by a program. Exploiting this vulnerability gives attackers the ability to run code as SYSTEM on the Exchange server. This requires administrator permission or another vulnerability to exploit. For details check here: https://www.microsoft.com/security/b
CVE-2021-26858 Microsoft Microsoft Exchange Server Remote Code Execution Vulnerability 03/03/2021 7.8 Post-authentication arbitrary file write vulnerability in Exchange. If attackers can authenticate with the Exchange server then they can use this vulnerability to write a file to any path on the server. They can authenticate by exploiting the CVE-2021-26855 SSRF vulnerability or by compromising a legitimate admin s credentials. For details check here: https://www.microsoft.com/security/blog/2021/03/02/hafni
CVE-2021-27065 Microsoft Microsoft Exchange Server Remote Code Execution Vulnerability 03/03/2021 7.8 Post-authentication arbitrary file write vulnerability in Exchange. If attackers can authenticate with the Exchange server then they can use this vulnerability to write a file to any path on the server. They can authenticate by exploiting the CVE-2021-26855 SSRF vulnerability or by compromising a legitimate admin s credentials. For details check here: https://www.microsoft.com/security/blog/2021/03/02/hafni
CVE-2020-1170 Microsoft Cloud Filter Arbitrary File Creation / Privilege Escalation 29/01/2021 7.8 An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1163.
CVE-2020-17136 Microsoft Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability 29/01/2021 7.8 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2021-1647 Microsoft Microsoft Defender Remote Code Execution Vulnerability 14/01/2021 7.8 Remote code execution (RCE) bug that allows threat actors to execute code on vulnerable devices where Defender is installed, without user interaction.
CVE-2020-1054 Microsoft Win32k Elevation of Privilege Vulnerability 28/09/2020 7.8 An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143.
CVE-2019-0808 Microsoft Win32k Elevation of Privilege Vulnerability 28/09/2020 7.8 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0797.
CVE-2020-0986 Microsoft Windows Kernel Elevation of Privilege Vulnerability 11/09/2020 7.8 An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'.
CVE-2020-17087 Microsoft Windows Kernel Local Elevation of Privilege Vulnerability 13/11/2020 7.8 Windows Kernel Local Elevation of Privilege Vulnerability
CVE-2020-0642 Microsoft Microsoft Windows Win32k Privilege Escalation 04/08/2020 7.8 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
CVE-2020-1048 Microsoft Windows Print Spooler Elevation of Privilege Vulnerability 26/06/2020 7.8 "An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an atta
?CVE-2020-0787 Microsoft Microsoft Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability 21/05/2020 7.8 An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status.
CVE-2021-33742 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability 09/06/2021 7.5 Windows MSHTML Platform Remote Code Execution Vulnerability
CVE-2020-1206 Microsoft Microsoft Windows SMBv3 Client/Server Remote Code Execution Vulnerability 26/06/2020 7.5 An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user s system. To exploit the vulnerability against a server, an unauthenticated attacker could send a specially crafted packet to a targeted SM
CVE-2021-26411 Microsoft Internet Explorer Memory Corruption Vulnerability 04/05/2021 7.5 An attacker could host a specially crafted website designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. However, in all cases an attacker would have no wa
?CVE-2020-0674 Microsoft Microsoft Scripting Engine Memory Corruption Vulnerability 21/05/2020 7.5 "A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. An attacker could then install programs; view, change, or delete data or create new accounts with full user rights."
?CVE-2020-3941 VMWare VMWare Privilege Escalation Vulnerability 21/05/2020 7.2 A vulnerability exists in VMware Tools for windows, which may allow for privilege escalation in the Virtual Machine where Tools is installed. A malicious actor on the guest VM might exploit the race condition and escalate their privileges on a Windows VM.?
CVE-2020-15999 Google Heap buffer overflow in Freetype in Google Chrome Vulnerability 13/11/2020 6.5 "Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. NOTE: This vulnerability has been added, despite having a ""Medium"" score, due to is active exploitation in the wild, in conjunction with Vulnerability CVE-2020-17087."

*This list has been compiled using different sources, and it focuses on vulnerabilities published in 2020, affecting Windows Operating Systems and some commonly used applications for Windows, with a CVS Score of 7.0 or higher. This is not an exhaustive list and it is provided as is, to help in prioritization efforts. It is not intended to be a replacement for any other source of vulnerability information.

Our Solutions

Guarantee the safety of your clients

Panda Adaptive Defense 360

Integrated Endpoint Protection Platform, EDR, and 100% Attestation Service.

Panda Adaptive Defense is a security suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with a unique 100% Attestation Service, all delivered via a single lightweight agent.

The combination of these solutions and services provides a highly detailed visibility of all endpoint activity, an absolute control of all running processes, and the reduction of the attack surface.

Contact us

Panda Patch Management

Reduce the risk and complexity of vulnerabilities

Manage vulnerabilities and their corresponding updates and patches, both for operating systems and hundreds of applications.

Strengthens threat prevention, containment and remediation capabilities, reducing the attack surface on Windows servers and workstations. Provides visibility of endpoint health in real time, in terms of vulnerabilities, patches or pending updates, and unsupported software (EoL).

Contact us

If you need more information Get in touch with your sales rep