VYPR

Windows 10 1909

by Microsoft

CVEs (703)

  • CVE-2020-17024Nov 11, 2020
    risk 0.00cvss epss 0.00

    Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability

  • CVE-2020-17014Nov 11, 2020
    risk 0.00cvss epss 0.00

    Windows Print Spooler Elevation of Privilege Vulnerability

  • CVE-2020-17013Nov 11, 2020
    risk 0.00cvss epss 0.00

    Win32k Information Disclosure Vulnerability

  • CVE-2020-17012Nov 11, 2020
    risk 0.00cvss epss 0.00

    Windows Bind Filter Driver Elevation of Privilege Vulnerability

  • CVE-2020-17011Nov 11, 2020
    risk 0.00cvss epss 0.00

    Windows Port Class Library Elevation of Privilege Vulnerability

  • CVE-2020-17007Nov 11, 2020
    risk 0.00cvss epss 0.00

    Windows Error Reporting Elevation of Privilege Vulnerability

  • CVE-2020-17010Nov 11, 2020
    risk 0.00cvss epss 0.00

    Win32k Elevation of Privilege Vulnerability

  • CVE-2020-17001Nov 11, 2020
    risk 0.00cvss epss 0.00

    Windows Print Spooler Elevation of Privilege Vulnerability

  • CVE-2020-17004Nov 11, 2020
    risk 0.00cvss epss 0.00

    Windows Graphics Component Information Disclosure Vulnerability

  • CVE-2020-17000Nov 11, 2020
    risk 0.00cvss epss 0.00

    Remote Desktop Protocol Client Information Disclosure Vulnerability

  • CVE-2020-16999Nov 11, 2020
    risk 0.00cvss epss 0.00

    Windows WalletService Information Disclosure Vulnerability

  • CVE-2020-16998Nov 11, 2020
    risk 0.00cvss epss 0.00

    DirectX Elevation of Privilege Vulnerability

  • CVE-2020-16997Nov 11, 2020
    risk 0.00cvss epss 0.02

    Remote Desktop Protocol Server Information Disclosure Vulnerability

  • CVE-2020-1243Oct 16, 2020
    risk 0.00cvss epss 0.00

    <p>A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.</p> <p>To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.</p> <p>The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.</p>

  • CVE-2020-1047Oct 16, 2020
    risk 0.00cvss epss 0.01

    <p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system.</p> <p>This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running.</p> <p>The update addresses the vulnerabilities by correcting how Windows Hyper-V handles objects in memory.</p>

  • CVE-2020-1080Oct 16, 2020
    risk 0.00cvss epss 0.01

    <p>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system.</p> <p>This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running.</p> <p>The update addresses the vulnerabilities by correcting how Windows Hyper-V handles objects in memory.</p>

  • CVE-2020-16975Oct 16, 2020
    risk 0.00cvss epss 0.00

    <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.</p> <p>The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.</p>

  • CVE-2020-16976Oct 16, 2020
    risk 0.00cvss epss 0.00

    <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.</p> <p>The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.</p>

  • CVE-2020-16974Oct 16, 2020
    risk 0.00cvss epss 0.00

    <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.</p> <p>The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.</p>

  • CVE-2020-16973Oct 16, 2020
    risk 0.00cvss epss 0.00

    <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.</p> <p>The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.</p>

Page 28 of 36