Msrc Windows Server 2012 vulnerabilities

3,255 known vulnerabilities affecting msrc/windows_server_2012.

Total CVEs
3,255
CISA KEV
133
actively exploited
Public exploits
201
Exploited in wild
124
Severity breakdown
CRITICAL83HIGH2162MEDIUM978LOW32

Vulnerabilities

Page 112 of 163
CVE-2020-1390HIGHCVSS 7.82020-07-14
CVE-2020-1390 [HIGH] Windows Network Connections Service Elevation of Privilege Vulnerability Windows Network Connections Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially c
msrc
CVE-2020-1408HIGHCVSS 8.82020-07-14
CVE-2020-1408 [HIGH] Microsoft Graphics Remote Code Execution Vulnerability Microsoft Graphics Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whos
msrc
CVE-2020-1412HIGHCVSS 7.52020-07-14
CVE-2020-1412 [HIGH] Microsoft Graphics Components Remote Code Execution Vulnerability Microsoft Graphics Components Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresse
msrc
CVE-2020-1041HIGHCVSS 8.02020-07-14
CVE-2020-1041 [CRITICAL] Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system, attacking certain third-party video drivers running on
msrc
CVE-2020-1430HIGHCVSS 7.82020-07-14
CVE-2020-1430 [HIGH] Windows UPnP Device Host Elevation of Privilege Vulnerability Windows UPnP Device Host Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by
msrc
CVE-2020-1036HIGHCVSS 8.02020-07-14
CVE-2020-1036 [CRITICAL] Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system, attacking certain third-party video drivers running on
msrc
CVE-2020-1040HIGHCVSS 8.0KEV2020-07-14
CVE-2020-1040 [CRITICAL] Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability Hyper-V RemoteFX vGPU Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Hyper-V RemoteFX vGPU on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system, attacking certain third-party video drivers running on
msrc
CVE-2020-1437HIGHCVSS 7.02020-07-14
CVE-2020-1437 [HIGH] Windows Network Location Awareness Service Elevation of Privilege Vulnerability Windows Network Location Awareness Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory. An attacker who successfully exploited the vulnerability could allow an application with limited privileges on an affected system to execute code at a medium integrity
msrc
CVE-2020-1407HIGHCVSS 7.82020-07-14
CVE-2020-1407 [HIGH] Jet Database Engine Remote Code Execution Vulnerability Jet Database Engine Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the v
msrc
CVE-2020-1384HIGHCVSS 7.02020-07-14
CVE-2020-1384 [HIGH] Windows CNG Key Isolation Service Elevation of Privilege Vulnerability Windows CNG Key Isolation Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Cryptography Next Generation (CNG) Key Isolation service improperly handles memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit this vulnerability, an attacker would first have to gain execu
msrc
CVE-2020-1371HIGHCVSS 7.82020-07-14
CVE-2020-1371 [HIGH] Windows Event Logging Service Elevation of Privilege Vulnerability Windows Event Logging Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Event Logging Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vu
msrc
CVE-2020-1085HIGHCVSS 7.82020-07-14
CVE-2020-1085 [HIGH] Windows Function Discovery Service Elevation of Privilege Vulnerability Windows Function Discovery Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially craf
msrc
CVE-2020-1356HIGHCVSS 7.82020-07-14
CVE-2020-1356 [HIGH] Windows iSCSI Target Service Elevation of Privilege Vulnerability Windows iSCSI Target Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a
msrc
CVE-2020-1421HIGHCVSS 7.52020-07-14
CVE-2020-1421 [HIGH] LNK Remote Code Execution Vulnerability LNK Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative
msrc
CVE-2020-1468MEDIUMCVSS 5.52020-07-14
CVE-2020-1468 [MEDIUM] Windows GDI Information Disclosure Vulnerability Windows GDI Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a special
msrc
CVE-2020-1333MEDIUMCVSS 6.72020-07-14
CVE-2020-1333 [MEDIUM] Group Policy Services Policy Processing Elevation of Privilege Vulnerability Group Policy Services Policy Processing Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Group Policy Services Policy Processing improperly handle reparse points. An attacker who successfully exploited this vulnerability could overwrite a targeted file that would normally require elevated permissions. To exploit the vulnerability, an attacker w
msrc
CVE-2020-1351MEDIUMCVSS 5.52020-07-14
CVE-2020-1351 [MEDIUM] Microsoft Graphics Component Information Disclosure Vulnerability Microsoft Graphics Component Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially craf
msrc
CVE-2020-1385MEDIUMCVSS 4.52020-07-14
CVE-2020-1385 [HIGH] Windows Credential Picker Elevation of Privilege Vulnerability Windows Credential Picker Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows Credential Picker handles objects in memory. An attacker who successfully exploited the vulnerability could allow an application with limited privileges on an affected system to execute code at a medium integrity level. To exploit the vulnerability, a locally auth
msrc
CVE-2020-1435MEDIUMCVSS 6.32020-07-14
CVE-2020-1435 [HIGH] GDI+ Remote Code Execution Vulnerability GDI+ Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are conf
msrc
CVE-2020-1419MEDIUMCVSS 5.52020-07-14
CVE-2020-1419 [MEDIUM] Windows Kernel Information Disclosure Vulnerability Windows Kernel Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted app
msrc