Filtered by vendor Microsoft
Subscriptions
Filtered by product Windows Server 1903
Subscriptions
Total
321 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-17076 | 1 Microsoft | 9 Windows 10, Windows 10 1809, Windows 10 1909 and 6 more | 2024-09-10 | 7.8 High |
Windows Update Orchestrator Service Elevation of Privilege Vulnerability | ||||
CVE-2020-17075 | 1 Microsoft | 13 Windows 10, Windows 10 1507, Windows 10 1607 and 10 more | 2024-09-10 | 7.8 High |
Windows USO Core Worker Elevation of Privilege Vulnerability | ||||
CVE-2020-17073 | 1 Microsoft | 9 Windows 10, Windows 10 1809, Windows 10 1909 and 6 more | 2024-09-10 | 7.8 High |
Windows Update Orchestrator Service Elevation of Privilege Vulnerability | ||||
CVE-2020-17071 | 1 Microsoft | 13 Windows 10, Windows 10 1507, Windows 10 1607 and 10 more | 2024-09-10 | 5.5 Medium |
Windows Delivery Optimization Information Disclosure Vulnerability | ||||
CVE-2020-17070 | 1 Microsoft | 11 Windows 10, Windows 10 1803, Windows 10 1809 and 8 more | 2024-09-10 | 7.8 High |
Windows Update Medic Service Elevation of Privilege Vulnerability | ||||
CVE-2020-17069 | 1 Microsoft | 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more | 2024-09-10 | 5.5 Medium |
Windows NDIS Information Disclosure Vulnerability | ||||
CVE-2020-17068 | 1 Microsoft | 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more | 2024-09-10 | 7.8 High |
Windows GDI+ Remote Code Execution Vulnerability | ||||
CVE-2020-17057 | 1 Microsoft | 12 Windows 10, Windows 10 1607, Windows 10 1803 and 9 more | 2024-09-10 | 7 High |
Windows Win32k Elevation of Privilege Vulnerability | ||||
CVE-2020-17056 | 1 Microsoft | 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more | 2024-09-10 | 5.5 Medium |
Windows Network File System Information Disclosure Vulnerability | ||||
CVE-2020-17055 | 1 Microsoft | 18 Windows 10, Windows 10 1507, Windows 10 1607 and 15 more | 2024-09-10 | 7.8 High |
Windows Remote Access Elevation of Privilege Vulnerability | ||||
CVE-2020-17004 | 1 Microsoft | 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more | 2024-09-10 | 5.5 Medium |
Windows Graphics Component Information Disclosure Vulnerability | ||||
CVE-2020-17001 | 1 Microsoft | 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more | 2024-09-10 | 7.8 High |
Windows Print Spooler Elevation of Privilege Vulnerability | ||||
CVE-2020-16998 | 1 Microsoft | 13 Windows 10, Windows 10 1507, Windows 10 1607 and 10 more | 2024-09-10 | 7 High |
DirectX Elevation of Privilege Vulnerability | ||||
CVE-2020-16997 | 1 Microsoft | 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more | 2024-09-10 | 7.7 High |
Remote Desktop Protocol Server Information Disclosure Vulnerability | ||||
CVE-2019-1322 | 1 Microsoft | 6 Windows 10 1803, Windows 10 1809, Windows 10 1903 and 3 more | 2024-08-04 | 7.8 High |
An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1320, CVE-2019-1340. | ||||
CVE-2019-1225 | 1 Microsoft | 9 Windows 10, Windows 10 1803, Windows 10 1809 and 6 more | 2024-08-04 | 7.5 High |
An information disclosure vulnerability exists when the Windows RDP server improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system. To exploit this vulnerability, an attacker would have to connect remotely to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows RDP server initializes memory. | ||||
CVE-2019-1206 | 1 Microsoft | 6 Windows Server 1803, Windows Server 1903, Windows Server 2012 and 3 more | 2024-08-04 | 7.5 High |
A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability could cause the DHCP service to become nonresponsive. To exploit the vulnerability, an attacker could send a specially crafted packet to a DHCP server. However, the DHCP server must be set to failover mode for the attack to succeed. The security update addresses the vulnerability by correcting how DHCP failover servers handle network packets. | ||||
CVE-2019-1180 | 1 Microsoft | 13 Windows 10, Windows 10 1507, Windows 10 1607 and 10 more | 2024-08-04 | 7 High |
An elevation of privilege vulnerability exists in the way that the wcmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the wcmsvc.dll properly handles objects in memory. | ||||
CVE-2019-1227 | 1 Microsoft | 7 Windows 10, Windows 10 1803, Windows 10 1809 and 4 more | 2024-08-04 | 5.5 Medium |
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory. | ||||
CVE-2019-1187 | 1 Microsoft | 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more | 2024-08-04 | 5.5 Medium |
A denial of service vulnerability exists when the XmlLite runtime (XmlLite.dll) improperly parses XML input. An attacker who successfully exploited this vulnerability could cause a denial of service against an XML application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to an XML application. The update addresses the vulnerability by correcting how the XmlLite runtime parses XML input. |