U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • CPE Product Version: cpe:/o:microsoft:windows_10:1809
There are 2,484 matching records.
Displaying matches 1,021 through 1,040.
Vuln ID Summary CVSS Severity
CVE-2020-17030

Windows MSCTF Server Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 4.9 MEDIUM
CVE-2020-17029

Windows Canonical Display Driver Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 4.9 MEDIUM
CVE-2020-17028

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17027

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17026

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17025

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17024

Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17014

Windows Print Spooler Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 6.6 MEDIUM
CVE-2020-17013

Win32k Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-17011

Windows Port Class Library Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17007

Windows Error Reporting Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.0 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17004

Windows Graphics Component Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-17001

Windows Print Spooler Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17000

Remote Desktop Protocol Client Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-16999

Windows WalletService Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-16998

DirectX Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 7.0 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-16997

Remote Desktop Protocol Server Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 7.7 HIGH
V2.0: 4.0 MEDIUM
CVE-2020-1243

<p>A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.</p> <p>To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.</p> <p>The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.</p>

Published: October 16, 2020; 7:15:17 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-1167

<p>A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.</p> <p>To exploit the vulnerability, a user would have to open a specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.</p>

Published: October 16, 2020; 7:15:17 PM -0400
V3.1: 7.8 HIGH
V2.0: 9.3 HIGH
CVE-2020-1080

<p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system.</p> <p>This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running.</p> <p>The update addresses the vulnerabilities by correcting how Windows Hyper-V handles objects in memory.</p>

Published: October 16, 2020; 7:15:17 PM -0400
V3.1: 8.8 HIGH
V2.0: 7.2 HIGH