Search Results (62 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2019-1182 1 Microsoft 16 Remote Desktop, Windows 10, Windows 10 1507 and 13 more 2026-02-20 9.8 Critical
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
CVE-2019-1181 1 Microsoft 16 Remote Desktop, Windows 10, Windows 10 1507 and 13 more 2026-02-20 9.8 Critical
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
CVE-2025-32715 1 Microsoft 27 Remote Desktop, Remote Desktop Client, Windows 10 1507 and 24 more 2026-02-20 6.5 Medium
Out-of-bounds read in Remote Desktop Client allows an unauthorized attacker to disclose information over a network.
CVE-2025-59230 1 Microsoft 31 Remote, Windows, Windows 10 and 28 more 2026-02-13 7.8 High
Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.
CVE-2025-58737 1 Microsoft 11 Remote Desktop, Windows, Windows Server and 8 more 2026-02-13 7 High
Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally.
CVE-2025-58718 1 Microsoft 35 Remote, Remote Desktop, Remote Desktop Client and 32 more 2026-02-13 8.8 High
Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
CVE-2025-59502 1 Microsoft 21 Remote, Windows, Windows 10 and 18 more 2026-02-13 7.5 High
Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.
CVE-2025-55340 1 Microsoft 21 Remote Desktop Protocol, Windows, Windows 10 and 18 more 2026-02-13 7 High
Improper authentication in Windows Remote Desktop Protocol allows an authorized attacker to bypass a security feature locally.
CVE-2025-60715 1 Microsoft 28 Remote, Windows, Windows 10 and 25 more 2026-02-13 8 High
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
CVE-2025-60713 1 Microsoft 8 Remote, Windows Server, Windows Server 2016 and 5 more 2026-02-13 7.8 High
Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.
CVE-2025-60703 1 Microsoft 28 Remote, Remote Desktop, Windows and 25 more 2026-02-13 7.8 High
Untrusted pointer dereference in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.
CVE-2025-59510 1 Microsoft 25 Remote, Windows, Windows 10 and 22 more 2026-02-13 5.5 Medium
Improper link resolution before file access ('link following') in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to deny service locally.
CVE-2025-26645 1 Microsoft 28 Remote Desktop, Remote Desktop Client, Windows 10 1507 and 25 more 2026-02-13 8.8 High
Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
CVE-2025-27487 1 Microsoft 27 Remote Desktop, Remote Desktop Client, Windows 10 1507 and 24 more 2026-02-13 8 High
Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.
CVE-2025-29967 1 Microsoft 25 Remote Desktop, Windows 10 1507, Windows 10 1607 and 22 more 2026-02-13 8.8 High
Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
CVE-2025-29966 1 Microsoft 26 Remote Desktop, Windows 10 1507, Windows 10 1607 and 23 more 2026-02-13 8.8 High
Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.
CVE-2025-48817 1 Microsoft 28 Remote Desktop, Remote Desktop Client, Windows 10 1507 and 25 more 2026-02-13 8.8 High
Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
CVE-2026-0747 2 Devolutions, Microsoft 2 Remote Desktop Manager, Windows 2026-01-22 3.3 Low
Exposure of sensitive information in the TeamViewer entry dashboard component in Devolutions Remote Desktop Manager 2025.3.24.0 through 2025.3.28.0 on Windows allows an external observer to view a password on screen via a defective masking feature, for example during physical observation or screen sharing.
CVE-2025-13683 2 Devolutions, Microsoft 3 Devolutions Server, Remote Desktop Manager, Windows 2025-12-18 6.5 Medium
Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.This issue affects Devolutions Server: through 2025.3.8.0; Remote Desktop Manager: through 2025.3.23.0.
CVE-2025-34352 2 Jumpcloud, Microsoft 2 Remote Assist, Windows 2025-12-04 N/A
JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninstaller that is invoked by the JumpCloud Windows Agent as NT AUTHORITY\SYSTEM during agent uninstall or update operations. The Remote Assist uninstaller performs privileged create, write, execute, and delete actions on predictable files inside a user-writable %TEMP% subdirectory without validating that the directory is trusted or resetting its ACLs when it already exists. A local, low-privileged attacker can pre-create the directory with weak permissions and leverage mount-point or symbolic-link redirection to (a) coerce arbitrary file writes to protected locations, leading to denial of service (e.g., by overwriting sensitive system files), or (b) win a race to redirect DeleteFileW() to attacker-chosen targets, enabling arbitrary file or folder deletion and local privilege escalation to SYSTEM. This issue is fixed in JumpCloud Remote Assist 0.317.0 and affects Windows systems where Remote Assist is installed and managed through the Agent lifecycle.