VYPR

Windows 10 1909

Sign in to watch

by Microsoft

CVEs (703)

CVESevRiskCVSSEPSSKEVPublishedDescription
CVE-2021-344840.120.03KEVAug 12, 2021Windows User Profile Service Elevation of Privilege Vulnerability
CVE-2021-344480.120.02KEVJul 16, 2021Scripting Engine Memory Corruption Vulnerability
CVE-2021-319550.120.04KEVJun 8, 2021Windows Kernel Information Disclosure Vulnerability
CVE-2021-311990.120.01KEVJun 8, 2021Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
CVE-2021-312010.120.01KEVJun 8, 2021Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
CVE-2020-13370.070.55Aug 17, 2020An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system.
CVE-2021-16780.060.76Jan 12, 2021Windows Print Spooler Spoofing Vulnerability
CVE-2021-284760.040.55May 11, 2021Windows Hyper-V Remote Code Execution Vulnerability
CVE-2021-240860.040.51Feb 25, 2021Windows TCP/IP Denial of Service Vulnerability
CVE-2021-386660.030.32Nov 10, 2021Remote Desktop Client Remote Code Execution Vulnerability
CVE-2021-16450.030.37Jan 12, 2021Windows Docker Information Disclosure Vulnerability
CVE-2020-168990.030.41Oct 16, 2020<p>A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could cause a target system to stop responding.</p> <p>To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The vulnerability would not allow an attacker to execute code or to elevate user rights directly.</p> <p>The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.</p>
CVE-2020-168980.030.33Oct 16, 2020<p>A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client.</p> <p>To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer.</p> <p>The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.</p>
CVE-2020-10740.030.31Sep 11, 2020<p>A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.</p> <p>An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.</p> <p>The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.</p>
CVE-2020-10130.030.32Sep 11, 2020<p>An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine.</p> <p>To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine. An attacker could then create a group policy to grant administrator rights to a standard user.</p> <p>The security update addresses the vulnerability by enforcing Kerberos authentication for certain calls over LDAP.</p>
CVE-2021-432170.020.24Dec 15, 2021Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
CVE-2021-413320.020.21Oct 13, 2021Windows Print Spooler Information Disclosure Vulnerability
CVE-2021-386290.020.22Sep 15, 2021Windows Ancillary Function Driver for WinSock Information Disclosure Vulnerability
CVE-2021-369320.020.23Aug 12, 2021Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability
CVE-2021-344810.020.22Jul 16, 2021<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p><strong>UPDATE</strong> August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see <a href="https://support.microsoft.com/help/5005652">KB5005652</a>.</p>

Page 2 of 36