CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 14740 CVEs

CVE ID Severity Description EPSS Published
7.8 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.0 HIGH

Double free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Access of resource using incompatible type ('type confusion') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.1% 2026-01-13
7.8 HIGH

Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Use after free in Windows Management Services allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Untrusted pointer dereference in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
8.1 HIGH

Improper input validation in Windows Server Update Service allows an unauthorized attacker to execute code over a network.

0.1% 2026-01-13
7.5 HIGH

Use after free in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to execute code over a network.

0.1% 2026-01-13
7.4 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows WalletService allows an unauthorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.7 HIGH

Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally.

0.0% 2026-01-13
7.5 HIGH

Reliance on untrusted inputs in a security decision in Windows Kerberos allows an authorized attacker to elevate privileges over a network.

0.1% 2026-01-13
7.5 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.

0.1% 2026-01-13
7.4 HIGH

Use after free in Windows Clipboard Server allows an unauthorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Improper access control in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.0 HIGH

Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Heap-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally.

0.0% 2026-01-13
7.8 HIGH

Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code locally.

0.0% 2026-01-13
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability

0.0% 2026-01-13
7.8 HIGH

Time-of-check time-of-use (toctou) race condition in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Tablet Windows User Interface (TWINUI) Subsystem allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Time-of-check time-of-use (toctou) race condition in Windows Installer allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.

0.1% 2026-01-13
7.8 HIGH

Free of memory not on the heap in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.8 HIGH

Time-of-check time-of-use (toctou) race condition in Windows Kernel Memory allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.0 HIGH

Concurrent execution using shared resource with improper synchronization ('race condition') in Printer Association Object allows an authorized attacker to elevate privileges locally.

0.0% 2026-01-13
7.7 HIGH

Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally.

0.0% 2026-01-13
7.2 HIGH

Missing authentication for critical function in SQL Server allows an authorized attacker to elevate privileges over a network.

0.1% 2026-01-13
7.5 HIGH

Improper access control in Windows Deployment Services allows an unauthorized attacker to execute code over an adjacent network.

0.1% 2026-01-13
7.5 HIGH

A vulnerability affecting HPE Networking Instant On Access Points has been identified where a device processing a specially crafted packet could enter a non-responsive state, in some cases requiring a hard reset to re-establish services. A malicious actor could leverage this vulnerability to conduct a Denial-of-Service attack on a target network.

0.0% 2026-01-13
7.5 HIGH

A vulnerability in the router mode configuration of HPE Instant On Access Points exposed certain network configuration details to unintended interfaces. A malicious actor could gain knowledge of internal network configuration details through inspecting impacted packets.

0.0% 2026-01-13
7.8 HIGH

Software installed and run as a non-privileged user may conduct improper GPU system calls to cause mismanagement of reference counting to cause a potential use after free. Improper reference counting on an internal resource caused scenario where potential for use after free was present.

0.0% 2026-01-13
8.8 HIGH

An authentication bypass vulnerability in the Tongyu AX1800 Wi-Fi 6 Router with firmware 1.0.0 allows unauthenticated network-adjacent attackers to perform arbitrary configuration changes without providing credentials, as long as a valid admin session is active. This can result in full compromise of the device (i.e., via unauthenticated access to /boaform/formSaveConfig and /boaform/admin endpoints).

0.2% 2026-01-13
7.2 HIGH

An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiClientEMS 7.4.3 through 7.4.4, FortiClientEMS 7.4.0 through 7.4.1, FortiClientEMS 7.2.0 through 7.2.10, FortiClientEMS 7.0 all versions may allow an authenticated attacker with at least read-only admin permission to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests.

0.1% 2026-01-13
8.8 HIGH

Software installed and run as a non-privileged user may conduct improper GPU system calls to cause mismanagement of resources reference counting creating a potential use after free scenario. Improper resource management and reference counting on an internal resource caused scenario where potential write use after free was present.

0.0% 2026-01-13
7.5 HIGH

Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a Creation of Temporary File With Insecure Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

0.0% 2026-01-13
7.5 HIGH

In Eptura Archibus 2024.03.01.109, the "Run script" and "Server File" components of the "Database Update Wizard" are vulnerable to directory traversal.

0.8% 2026-01-13
8.1 HIGH

A heap-based buffer overflow vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiOS 6.4 all versions, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows attacker to execute unauthorized code or commands via specially crafted packets

0.0% 2026-01-13
8.0 HIGH

A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router GUI.

0.1% 2026-01-13
8.0 HIGH

An insufficient authentication vulnerability in NETGEAR WiFi range extenders allows a network adjacent attacker with WiFi authentication or a physical Ethernet port connection to bypass the authentication process and access the admin panel.

0.1% 2026-01-13