Search Results (Refine Search)
- CPE Product Version: cpe:/o:microsoft:windows_server_2016:1803
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2019-1398 |
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1389, CVE-2019-1397. Published: November 12, 2019; 2:15:13 PM -0500 |
V3.1: 8.4 HIGH V2.0: 7.7 HIGH |
CVE-2019-1397 |
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1389, CVE-2019-1398. Published: November 12, 2019; 2:15:13 PM -0500 |
V3.1: 8.4 HIGH V2.0: 7.7 HIGH |
CVE-2019-1396 |
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1393, CVE-2019-1394, CVE-2019-1395, CVE-2019-1408, CVE-2019-1434. Published: November 12, 2019; 2:15:13 PM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2019-1395 |
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1393, CVE-2019-1394, CVE-2019-1396, CVE-2019-1408, CVE-2019-1434. Published: November 12, 2019; 2:15:13 PM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2019-1394 |
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1393, CVE-2019-1395, CVE-2019-1396, CVE-2019-1408, CVE-2019-1434. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2019-1393 |
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1394, CVE-2019-1395, CVE-2019-1396, CVE-2019-1408, CVE-2019-1434. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2019-1391 |
A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'. This CVE ID is unique from CVE-2018-12207. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2019-1389 |
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1397, CVE-2019-1398. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 8.4 HIGH V2.0: 7.7 HIGH |
CVE-2019-1388 |
An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2019-1385 |
An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 7.8 HIGH V2.0: 6.1 MEDIUM |
CVE-2019-1384 |
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.To exploit this vulnerability, an attacker could send a specially crafted authentication request, aka 'Microsoft Windows Security Feature Bypass Vulnerability'. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 9.9 CRITICAL V2.0: 6.5 MEDIUM |
CVE-2019-1383 |
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations, aka 'Windows Data Sharing Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1379, CVE-2019-1417. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2019-1382 |
An elevation of privilege vulnerability exists when ActiveX Installer service may allow access to files without proper authentication, aka 'Microsoft ActiveX Installer Service Elevation of Privilege Vulnerability'. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2019-1381 |
An information disclosure vulnerability exists when the Windows Servicing Stack allows access to unprivileged file locations, aka 'Microsoft Windows Information Disclosure Vulnerability'. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2019-1380 |
A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls, aka 'Microsoft splwow64 Elevation of Privilege Vulnerability'. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2019-1374 |
An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory, aka 'Windows Error Reporting Information Disclosure Vulnerability'. Published: November 12, 2019; 2:15:12 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2019-1324 |
An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles IPv6 flowlabel filled in packets, aka 'Windows TCP/IP Information Disclosure Vulnerability'. Published: November 12, 2019; 2:15:11 PM -0500 |
V3.1: 5.3 MEDIUM V2.0: 5.0 MEDIUM |
CVE-2019-1310 |
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0712, CVE-2019-1309, CVE-2019-1399. Published: November 12, 2019; 2:15:11 PM -0500 |
V3.1: 6.8 MEDIUM V2.0: 6.8 MEDIUM |
CVE-2019-1309 |
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0712, CVE-2019-1310, CVE-2019-1399. Published: November 12, 2019; 2:15:11 PM -0500 |
V3.1: 6.8 MEDIUM V2.0: 6.8 MEDIUM |
CVE-2019-0721 |
A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0719. Published: November 12, 2019; 2:15:11 PM -0500 |
V3.1: 9.1 CRITICAL V2.0: 9.0 HIGH |