Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2021-28476 |
Windows Hyper-V Remote Code Execution Vulnerability Published: May 11, 2021; 3:15:09 PM -0400 |
V3.1: 9.9 CRITICAL V2.0: 6.5 MEDIUM |
CVE-2021-28444 |
Windows Hyper-V Security Feature Bypass Vulnerability Published: April 13, 2021; 4:15:19 PM -0400 |
V3.1: 5.7 MEDIUM V2.0: 4.0 MEDIUM |
CVE-2021-26879 |
Windows Network Address Translation (NAT) Denial of Service Vulnerability Published: March 11, 2021; 11:15:15 AM -0500 |
V3.1: 7.5 HIGH V2.0: 5.0 MEDIUM |
CVE-2021-24076 |
Microsoft Windows VMSwitch Information Disclosure Vulnerability Published: February 25, 2021; 6:15:14 PM -0500 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2021-1704 |
Windows Hyper-V Elevation of Privilege Vulnerability Published: January 12, 2021; 3:15:34 PM -0500 |
V3.1: 7.3 HIGH V2.0: 7.2 HIGH |
CVE-2020-17140 |
Windows SMB Information Disclosure Vulnerability Published: December 09, 2020; 7:15:15 PM -0500 |
V3.1: 8.1 HIGH V2.0: 4.0 MEDIUM |
CVE-2020-17136 |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Published: December 09, 2020; 7:15:15 PM -0500 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17134 |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Published: December 09, 2020; 7:15:15 PM -0500 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-17095 |
Windows Hyper-V Remote Code Execution Vulnerability Published: December 09, 2020; 7:15:14 PM -0500 |
V3.1: 8.5 HIGH V2.0: 9.0 HIGH |
CVE-2020-1243 |
<p>A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.</p> <p>To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.</p> <p>The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.</p> Published: October 16, 2020; 7:15:17 PM -0400 |
V3.1: 7.8 HIGH V2.0: 4.6 MEDIUM |
CVE-2020-1080 |
<p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system.</p> <p>This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running.</p> <p>The update addresses the vulnerabilities by correcting how Windows Hyper-V handles objects in memory.</p> Published: October 16, 2020; 7:15:17 PM -0400 |
V3.1: 8.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-1047 |
<p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system.</p> <p>This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running.</p> <p>The update addresses the vulnerabilities by correcting how Windows Hyper-V handles objects in memory.</p> Published: October 16, 2020; 7:15:17 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-16891 |
<p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.</p> <p>An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.</p> <p>The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.</p> Published: October 16, 2020; 7:15:13 PM -0400 |
V3.1: 8.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-1421 |
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'. Published: July 14, 2020; 7:15:18 PM -0400 |
V3.1: 8.8 HIGH V2.0: 9.3 HIGH |
CVE-2020-1420 |
An information disclosure vulnerability exists when Windows Error Reporting improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Error Reporting Information Disclosure Vulnerability'. Published: July 14, 2020; 7:15:17 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-1419 |
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1367, CVE-2020-1389, CVE-2020-1426. Published: July 14, 2020; 7:15:17 PM -0400 |
V3.1: 5.5 MEDIUM V2.0: 2.1 LOW |
CVE-2020-1418 |
An elevation of privilege vulnerability exists when the Windows Diagnostics Execution Service fails to properly sanitize input, leading to an unsecure library-loading behavior, aka 'Windows Diagnostics Hub Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1393. Published: July 14, 2020; 7:15:17 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-1412 |
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Remote Code Execution Vulnerability'. Published: July 14, 2020; 7:15:17 PM -0400 |
V3.1: 8.8 HIGH V2.0: 9.3 HIGH |
CVE-2020-1411 |
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1336. Published: July 14, 2020; 7:15:17 PM -0400 |
V3.1: 7.8 HIGH V2.0: 7.2 HIGH |
CVE-2020-1410 |
A remote code execution vulnerability exists when Windows Address Book (WAB) improperly processes vcard files.To exploit the vulnerability, an attacker could send a malicious vcard that a victim opens using Windows Address Book (WAB), aka 'Windows Address Book Remote Code Execution Vulnerability'. Published: July 14, 2020; 7:15:17 PM -0400 |
V3.1: 7.8 HIGH V2.0: 9.3 HIGH |