Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows defender - vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2021-0313
In isWordBreakAfter of LayoutUtils.cpp, there is a possible way to slow or crash a TextView due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Andr...
Google Android 8.0
Google Android 8.1
Google Android 9.0
Google Android 10.0
Google Android 11.0
1 Github repository
1 Article
9.8
CVSSv3
CVE-2021-0316
In avrc_pars_vendor_cmd of avrc_pars_tg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: And...
Google Android 8.0
Google Android 8.1
Google Android 9.0
Google Android 10.0
Google Android 11.0
1 Article
9.1
CVSSv3
CVE-2020-17132
Microsoft Exchange Remote Code Execution Vulnerability
Microsoft Exchange Server 2013
Microsoft Exchange Server 2019
Microsoft Exchange Server 2016
2 Articles
5.3
CVSSv3
CVE-2020-17090
Microsoft Defender for Endpoint Security Feature Bypass Vulnerability
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows Server 2016 1903
Microsoft Windows 10 1903
Microsoft Windows Server 2016 1909
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
Microsoft Windows Server 2016 20h2
5.3
CVSSv3
CVE-2020-16886
<p>A security feature bypass vulnerability exists in the PowerShellGet V2 module. An attacker who successfully exploited this vulnerability could bypass WDAC (Windows Defender Application Control) policy and execute arbitrary code on a policy locked-down machine.</p> ...
Microsoft Powershellget 2.2.5
8.4
CVSSv3
CVE-2020-16875
<p>A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.</p> <p>An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. Exploitation ...
Microsoft Exchange Server 2019
Microsoft Exchange Server 2016
2 Articles
6.7
CVSSv3
CVE-2020-0951
<p>A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an malicious user to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked...
Microsoft Windows 10 1607
Microsoft Windows Server 2016 -
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows Server 2016 1903
Microsoft Windows 10 1903
Microsoft Windows Server 2016 1909
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
Microsoft Powershell
Microsoft Powershell 7.0.8
7.1
CVSSv3
CVE-2020-1461
An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability...
Microsoft Windows Defender -
Microsoft Forefront Endpoint Protection 2010 -
Microsoft Security Essentials -
Microsoft System Center Endpoint Protection -
Microsoft System Center Endpoint Protection 2012
7.8
CVSSv3
CVE-2020-1170
An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'....
Microsoft Windows Defender -
Microsoft Forefront Endpoint Protection 2010 -
Microsoft Security Essentials -
Microsoft System Center Endpoint Protection 2012
1 Github repository
7.8
CVSSv3
CVE-2020-1163
An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'....
Microsoft Windows Defender -
Microsoft Forefront Endpoint Protection 2010 -
Microsoft Security Essentials -
Microsoft System Center Endpoint Protection 2012
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
client side
CVE-2021-47601
deserialization
CVE-2024-34994
encryption
CVE-2021-47609
CVE-2024-37079
CVE-2024-38608
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »