Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.
Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.
Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally.
Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.
Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
Improper authentication in Windows Storage allows an authorized attacker to elevate privileges locally.
Improper access control in Windows Hyper-V allows an authorized attacker to bypass a security feature locally.
Use after free in Mailslot File System allows an authorized attacker to elevate privileges locally.
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing locally.
Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to execute code locally.
Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally.
Heap-based buffer overflow in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to execute code locally.
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally.
Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally.
Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network.