Filtered by vendor Microsoft
Subscriptions
Filtered by product Windows Server 1903
Subscriptions
Total
321 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-17031 | 1 Microsoft | 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more | 2024-11-21 | 7.8 High |
Windows Remote Access Elevation of Privilege Vulnerability | ||||
CVE-2020-17030 | 1 Microsoft | 11 Windows 10, Windows 10 1803, Windows 10 1809 and 8 more | 2024-11-21 | 5.5 Medium |
Windows MSCTF Server Information Disclosure Vulnerability | ||||
CVE-2020-17029 | 1 Microsoft | 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more | 2024-11-21 | 5.5 Medium |
Windows Canonical Display Driver Information Disclosure Vulnerability | ||||
CVE-2020-17028 | 1 Microsoft | 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more | 2024-11-21 | 7.8 High |
Windows Remote Access Elevation of Privilege Vulnerability | ||||
CVE-2020-17027 | 1 Microsoft | 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more | 2024-11-21 | 7.8 High |
Windows Remote Access Elevation of Privilege Vulnerability | ||||
CVE-2020-17026 | 1 Microsoft | 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more | 2024-11-21 | 7.8 High |
Windows Remote Access Elevation of Privilege Vulnerability | ||||
CVE-2020-17025 | 1 Microsoft | 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more | 2024-11-21 | 7.8 High |
Windows Remote Access Elevation of Privilege Vulnerability | ||||
CVE-2020-17024 | 1 Microsoft | 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more | 2024-11-21 | 7.8 High |
Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability | ||||
CVE-2020-17014 | 1 Microsoft | 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more | 2024-11-21 | 7.8 High |
Windows Print Spooler Elevation of Privilege Vulnerability | ||||
CVE-2020-17013 | 1 Microsoft | 11 Windows 10, Windows 10 1803, Windows 10 1809 and 8 more | 2024-11-21 | 5.5 Medium |
Win32k Information Disclosure Vulnerability | ||||
CVE-2020-17012 | 1 Microsoft | 7 Windows 10, Windows 10 1803, Windows 10 1809 and 4 more | 2024-11-21 | 7.8 High |
Windows Bind Filter Driver Elevation of Privilege Vulnerability | ||||
CVE-2020-17011 | 1 Microsoft | 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more | 2024-11-21 | 7.8 High |
Windows Port Class Library Elevation of Privilege Vulnerability | ||||
CVE-2020-17010 | 1 Microsoft | 9 Windows 10, Windows 10 1809, Windows 10 1909 and 6 more | 2024-11-21 | 7.8 High |
Win32k Elevation of Privilege Vulnerability | ||||
CVE-2020-17007 | 1 Microsoft | 13 Windows 10, Windows 10 1507, Windows 10 1607 and 10 more | 2024-11-21 | 7 High |
Windows Error Reporting Elevation of Privilege Vulnerability | ||||
CVE-2020-17004 | 1 Microsoft | 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more | 2024-11-21 | 5.5 Medium |
Windows Graphics Component Information Disclosure Vulnerability | ||||
CVE-2020-17001 | 1 Microsoft | 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more | 2024-11-21 | 7.8 High |
Windows Print Spooler Elevation of Privilege Vulnerability | ||||
CVE-2020-16998 | 1 Microsoft | 13 Windows 10, Windows 10 1507, Windows 10 1607 and 10 more | 2024-11-21 | 7 High |
DirectX Elevation of Privilege Vulnerability | ||||
CVE-2020-16997 | 1 Microsoft | 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more | 2024-11-21 | 7.7 High |
Remote Desktop Protocol Server Information Disclosure Vulnerability | ||||
CVE-2020-16996 | 1 Microsoft | 8 Windows Server 1903, Windows Server 1909, Windows Server 2004 and 5 more | 2024-11-21 | 6.5 Medium |
Kerberos Security Feature Bypass Vulnerability | ||||
CVE-2020-16980 | 1 Microsoft | 7 Windows Server 1903, Windows Server 1909, Windows Server 2004 and 4 more | 2024-11-21 | 7.8 High |
<p>An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.</p> <p>To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows iSCSI Target Service properly handles file operations.</p> |