Msrc Windows Server 2019 vulnerabilities
4,184 known vulnerabilities affecting msrc/windows_server_2019.
Total CVEs
4,184
CISA KEV
151
actively exploited
Public exploits
123
Exploited in wild
142
Severity breakdown
CRITICAL90HIGH2890MEDIUM1182LOW22
Vulnerabilities
Page 170 of 210
CVE-2020-1186HIGHCVSS 7.82020-05-12
CVE-2020-1186 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1086HIGHCVSS 7.82020-05-12
CVE-2020-1086 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1189HIGHCVSS 7.82020-05-12
CVE-2020-1189 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1140HIGHCVSS 7.82020-05-12
CVE-2020-1140 [HIGH] DirectX Elevation of Privilege Vulnerability
DirectX Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would first have t
msrc
CVE-2020-1185HIGHCVSS 7.82020-05-12
CVE-2020-1185 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1188HIGHCVSS 7.82020-05-12
CVE-2020-1188 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1164HIGHCVSS 7.02020-05-12
CVE-2020-1164 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1087HIGHCVSS 7.82020-05-12
CVE-2020-1087 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerabi
msrc
CVE-2020-1021HIGHCVSS 7.82020-05-12
CVE-2020-1021 [HIGH] Windows Error Reporting Elevation of Privilege Vulnerability
Windows Error Reporting Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it.
An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functional
msrc
CVE-2020-1112HIGHCVSS 8.52020-05-12
CVE-2020-1112 [CRITICAL] Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) IIS module improperly handles uploaded content. An attacker who successfully exploited this vulnerability could upload restricted file types to an IIS-hosted folder.
To exploit thi
msrc
CVE-2020-0909HIGHCVSS 7.52020-05-12
CVE-2020-0909 [HIGH] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Description: A denial of service vulnerability exists when Hyper-V on a Windows Server fails to properly handle specially crafted network packets.
To exploit the vulnerability, an attacker would send specially crafted network packets to the Hyper-V Server.
The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to properly handle these
msrc
CVE-2020-1143HIGHCVSS 7.02020-05-12
CVE-2020-1143 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2020-1149HIGHCVSS 7.02020-05-12
CVE-2020-1149 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1135HIGHCVSS 7.82020-05-12
CVE-2020-1135 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2020-1190HIGHCVSS 7.82020-05-12
CVE-2020-1190 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1137HIGHCVSS 7.82020-05-12
CVE-2020-1137 [HIGH] Windows Push Notification Service Elevation of Privilege Vulnerability
Windows Push Notification Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way the Windows Push Notification Service handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data.
To exploit this vulnerabilit
msrc
CVE-2020-1070HIGHCVSS 7.82020-05-12
CVE-2020-1070 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new acco
msrc
CVE-2020-1081HIGHCVSS 7.82020-05-12
CVE-2020-1081 [HIGH] Windows Printer Service Elevation of Privilege Vulnerability
Windows Printer Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers. An authenticated attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges.
To exploit this vulnerability, an attacker would first have to log on
msrc
CVE-2020-1077HIGHCVSS 7.82020-05-12
CVE-2020-1077 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1125HIGHCVSS 7.02020-05-12
CVE-2020-1125 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc