Msrc Windows Server Version 1903 vulnerabilities
587 known vulnerabilities affecting msrc/windows_server_version_1903.
Total CVEs
587
CISA KEV
14
actively exploited
Public exploits
26
Exploited in wild
16
Severity breakdown
CRITICAL10HIGH437MEDIUM138LOW2
Vulnerabilities
Page 15 of 30
CVE-2020-1185HIGHCVSS 7.82020-05-12
CVE-2020-1185 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1188HIGHCVSS 7.82020-05-12
CVE-2020-1188 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1164HIGHCVSS 7.02020-05-12
CVE-2020-1164 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1087HIGHCVSS 7.82020-05-12
CVE-2020-1087 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerabi
msrc
CVE-2020-1021HIGHCVSS 7.82020-05-12
CVE-2020-1021 [HIGH] Windows Error Reporting Elevation of Privilege Vulnerability
Windows Error Reporting Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it.
An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functional
msrc
CVE-2020-1149HIGHCVSS 7.02020-05-12
CVE-2020-1149 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1135HIGHCVSS 7.82020-05-12
CVE-2020-1135 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2020-1190HIGHCVSS 7.82020-05-12
CVE-2020-1190 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1137HIGHCVSS 7.82020-05-12
CVE-2020-1137 [HIGH] Windows Push Notification Service Elevation of Privilege Vulnerability
Windows Push Notification Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way the Windows Push Notification Service handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data.
To exploit this vulnerabilit
msrc
CVE-2020-1077HIGHCVSS 7.82020-05-12
CVE-2020-1077 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1125HIGHCVSS 7.02020-05-12
CVE-2020-1125 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1134HIGHCVSS 7.82020-05-12
CVE-2020-1134 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1111HIGHCVSS 7.82020-05-12
CVE-2020-1111 [HIGH] Windows Clipboard Service Elevation of Privilege Vulnerability
Windows Clipboard Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Clipboard Service. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full
msrc
CVE-2020-1138HIGHCVSS 7.02020-05-12
CVE-2020-1138 [HIGH] Windows Storage Service Elevation of Privilege Vulnerability
Windows Storage Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system.
To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially craf
msrc
CVE-2020-1136HIGHCVSS 7.82020-05-12
CVE-2020-1136 [HIGH] Media Foundation Memory Corruption Vulnerability
Media Foundation Memory Corruption Vulnerability
Description: A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to
msrc
CVE-2020-1156HIGHCVSS 7.82020-05-12
CVE-2020-1156 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1132HIGHCVSS 7.02020-05-12
CVE-2020-1132 [HIGH] Windows Error Reporting Manager Elevation of Privilege Vulnerability
Windows Error Reporting Manager Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles file and folder links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status.
To exploit this vulnerability, an attacker would first have to log on to the sys
msrc
CVE-2020-1110HIGHCVSS 7.82020-05-12
CVE-2020-1110 [HIGH] Windows Update Stack Elevation of Privilege Vulnerability
Windows Update Stack Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit t
msrc
CVE-2020-1068HIGHCVSS 7.82020-05-12
CVE-2020-1068 [HIGH] Microsoft Windows Elevation of Privilege Vulnerability
Microsoft Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows Media Service that allows file creation in arbitrary locations.
To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update ad
msrc
CVE-2020-1144HIGHCVSS 7.82020-05-12
CVE-2020-1144 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability
Windows State Repository Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on
msrc