U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*
  • CPE Name Search: true
There are 1,199 matching records.
Displaying matches 1,041 through 1,060.
Vuln ID Summary CVSS Severity
CVE-2020-17031

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17030

Windows MSCTF Server Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 4.9 MEDIUM
CVE-2020-17029

Windows Canonical Display Driver Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 4.9 MEDIUM
CVE-2020-17028

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17027

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17026

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:15 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17025

Windows Remote Access Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17024

Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17014

Windows Print Spooler Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 6.6 MEDIUM
CVE-2020-17013

Win32k Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-17011

Windows Port Class Library Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17010

Win32k Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2020-17007

Windows Error Reporting Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:14 AM -0500
V3.1: 7.0 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17004

Windows Graphics Component Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-17001

Windows Print Spooler Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-17000

Remote Desktop Protocol Client Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-16999

Windows WalletService Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2020-16998

DirectX Elevation of Privilege Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 7.0 HIGH
V2.0: 4.6 MEDIUM
CVE-2020-16997

Remote Desktop Protocol Server Information Disclosure Vulnerability

Published: November 11, 2020; 2:15:13 AM -0500
V3.1: 7.7 HIGH
V2.0: 4.0 MEDIUM
CVE-2020-9633

Adobe Flash Player Desktop Runtime 32.0.0.371 and earlier, Adobe Flash Player for Google Chrome 32.0.0.371 and earlier, and Adobe Flash Player for Microsoft Edge and Internet Explorer 32.0.0.330 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.

Published: June 12, 2020; 10:15:11 AM -0400
V3.1: 9.8 CRITICAL
V2.0: 10.0 HIGH