Total
3359 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-17056 | 1 Microsoft | 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
Windows Network File System Information Disclosure Vulnerability | |||||
CVE-2021-26880 | 1 Microsoft | 3 Windows 10, Windows Server 2016, Windows Server 2019 | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
Storage Spaces Controller Elevation of Privilege Vulnerability | |||||
CVE-2021-24098 | 1 Microsoft | 3 Windows 10, Windows Server 2016, Windows Server 2019 | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
Windows Console Driver Denial of Service Vulnerability | |||||
CVE-2021-1640 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
Windows Print Spooler Elevation of Privilege Vulnerability | |||||
CVE-2020-16892 | 1 Microsoft | 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
<p>An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory.</p> | |||||
CVE-2020-16949 | 1 Microsoft | 11 365 Apps, Office, Outlook and 8 more | 2024-02-04 | 5.0 MEDIUM | 4.7 MEDIUM |
<p>A denial of service vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could cause a remote denial of service against a system.</p> <p>Exploitation of the vulnerability requires that a specially crafted email be sent to a vulnerable Outlook server.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Outlook handles objects in memory.</p> | |||||
CVE-2020-17139 | 1 Microsoft | 3 Windows 10, Windows Server 2016, Windows Server 2019 | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
Windows Overlay Filter Security Feature Bypass Vulnerability | |||||
CVE-2020-16899 | 1 Microsoft | 3 Windows 10, Windows Server 2016, Windows Server 2019 | 2024-02-04 | 7.8 HIGH | 7.5 HIGH |
<p>A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could cause a target system to stop responding.</p> <p>To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The vulnerability would not allow an attacker to execute code or to elevate user rights directly.</p> <p>The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.</p> | |||||
CVE-2020-17162 | 1 Microsoft | 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
Microsoft Windows Security Feature Bypass Vulnerability | |||||
CVE-2020-17051 | 1 Microsoft | 4 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 1 more | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
Windows Network File System Remote Code Execution Vulnerability | |||||
CVE-2021-26886 | 1 Microsoft | 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more | 2024-02-04 | 3.6 LOW | 6.1 MEDIUM |
User Profile Service Denial of Service Vulnerability | |||||
CVE-2020-17032 | 1 Microsoft | 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
Windows Remote Access Elevation of Privilege Vulnerability | |||||
CVE-2020-16900 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2024-02-04 | 4.6 MEDIUM | 7.0 HIGH |
<p>An elevation of privilege vulnerability exists when the Windows Event System improperly handles objects in memory.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.</p> <p>The security update addresses the vulnerability by correcting how the Windows Event System handles objects in memory.</p> | |||||
CVE-2020-16891 | 1 Microsoft | 7 Windows 10, Windows 7, Windows 8.1 and 4 more | 2024-02-04 | 7.2 HIGH | 8.8 HIGH |
<p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.</p> <p>An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.</p> <p>The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.</p> | |||||
CVE-2021-26891 | 1 Microsoft | 3 Windows 10, Windows Server 2016, Windows Server 2019 | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
Windows Container Execution Agent Elevation of Privilege Vulnerability | |||||
CVE-2021-1734 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Windows Remote Procedure Call Information Disclosure Vulnerability | |||||
CVE-2021-24078 | 1 Microsoft | 4 Windows Server 2008, Windows Server 2012, Windows Server 2016 and 1 more | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Windows DNS Server Remote Code Execution Vulnerability | |||||
CVE-2021-24081 | 1 Microsoft | 3 Windows 10, Windows Server 2016, Windows Server 2019 | 2024-02-04 | 6.8 MEDIUM | 7.8 HIGH |
Microsoft Windows Codecs Library Remote Code Execution Vulnerability | |||||
CVE-2021-1708 | 1 Microsoft | 8 Windows 10, Windows 7, Windows 8.1 and 5 more | 2024-02-04 | 3.5 LOW | 5.7 MEDIUM |
Windows GDI+ Information Disclosure Vulnerability | |||||
CVE-2021-26890 | 1 Microsoft | 3 Windows 10, Windows Server 2016, Windows Server 2019 | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
Application Virtualization Remote Code Execution Vulnerability |