Search Results (Refine Search)
- Keyword (text search): cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:essentials:*:x86:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2020-17033 |
Windows Remote Access Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:15 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17032 |
Windows Remote Access Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:15 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17031 |
Windows Remote Access Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:15 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17029 |
Windows Canonical Display Driver Information Disclosure Vulnerability Published: November 11, 2020; 2:15:15 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0: 4.9 MEDIUM |
CVE-2020-17028 |
Windows Remote Access Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:15 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17027 |
Windows Remote Access Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:15 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17026 |
Windows Remote Access Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:15 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17025 |
Windows Remote Access Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:14 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17024 |
Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:14 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-17014 |
Windows Print Spooler Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:14 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 6.6 MEDIUM |
CVE-2020-17013 |
Win32k Information Disclosure Vulnerability Published: November 11, 2020; 2:15:14 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-17011 |
Windows Port Class Library Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:14 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-17007 |
Windows Error Reporting Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:14 AM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17004 |
Windows Graphics Component Information Disclosure Vulnerability Published: November 11, 2020; 2:15:13 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-17001 |
Windows Print Spooler Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:13 AM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17000 |
Remote Desktop Protocol Client Information Disclosure Vulnerability Published: November 11, 2020; 2:15:13 AM -0500 |
V4.0:(not available) V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-16998 |
DirectX Elevation of Privilege Vulnerability Published: November 11, 2020; 2:15:13 AM -0500 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-16997 |
Remote Desktop Protocol Server Information Disclosure Vulnerability Published: November 11, 2020; 2:15:13 AM -0500 |
V4.0:(not available) V3.1: 7.7 HIGH V2.0: 4.0 MEDIUM |
CVE-2020-1243 |
<p>A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.</p> <p>To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.</p> <p>The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.</p> Published: October 16, 2020; 7:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-1167 |
<p>A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.</p> <p>To exploit the vulnerability, a user would have to open a specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.</p> Published: October 16, 2020; 7:15:17 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 9.3 HIGH |