Msrc Windows Server Version 1903 vulnerabilities
587 known vulnerabilities affecting msrc/windows_server_version_1903.
Total CVEs
587
CISA KEV
14
actively exploited
Public exploits
26
Exploited in wild
16
Severity breakdown
CRITICAL10HIGH437MEDIUM138LOW2
Vulnerabilities
Page 22 of 30
CVE-2020-0757HIGHCVSS 8.22020-02-11
CVE-2020-0757 [HIGH] Windows SSH Elevation of Privilege Vulnerability
Windows SSH Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Windows improperly handles Secure Socket Shell remote commands. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application
msrc
CVE-2020-0740HIGHCVSS 7.82020-02-11
CVE-2020-0740 [HIGH] Connected Devices Platform Service Elevation of Privilege Vulnerability
Connected Devices Platform Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially craf
msrc
CVE-2020-0669HIGHCVSS 7.82020-02-11
CVE-2020-0669 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerabi
msrc
CVE-2020-0679HIGHCVSS 7.82020-02-11
CVE-2020-0679 [HIGH] Windows Function Discovery Service Elevation of Privilege Vulnerability
Windows Function Discovery Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially craf
msrc
CVE-2020-0818HIGHCVSS 7.82020-02-11
CVE-2020-0818 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the sysmain.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerability by ensuring
msrc
CVE-2020-0661MEDIUMCVSS 6.82020-02-11
CVE-2020-0661 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Description: A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host ma
msrc
CVE-2020-0717MEDIUMCVSS 5.52020-02-11
CVE-2020-0717 [MEDIUM] Win32k Information Disclosure Vulnerability
Win32k Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
The security
msrc
CVE-2020-0746MEDIUMCVSS 5.52020-02-11
CVE-2020-0746 [MEDIUM] Microsoft Graphics Components Information Disclosure Vulnerability
Microsoft Graphics Components Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information that could be useful for further exploitation.
To exploit the vulnerability, a user would have to open a specially crafted file.
msrc
CVE-2020-0751MEDIUMCVSS 6.02020-02-11
CVE-2020-0751 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Description: A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.
To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.
The security
msrc
CVE-2020-0714MEDIUMCVSS 4.72020-02-11
CVE-2020-0714 [MEDIUM] DirectX Information Disclosure Vulnerability
DirectX Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
An authenticated attacker could exploit this vulnerability by running a specially crafted application.
The update addresses the vulnerability by correc
msrc
CVE-2020-0728LOWCVSS 3.32020-02-11
CVE-2020-0728 [MEDIUM] Windows Modules Installer Service Information Disclosure Vulnerability
Windows Modules Installer Service Information Disclosure Vulnerability
Description: An information vulnerability exists when Windows Modules Installer Service improperly discloses file information. Successful exploitation of the vulnerability could allow the attacker to read any file on the file system.
To exploit the vulnerability, an attacker would have to log onto an affected system and run a specia
msrc
CVE-2020-0613HIGHCVSS 7.82020-01-14
CVE-2020-0613 [HIGH] Windows Search Indexer Elevation of Privilege Vulnerability
Windows Search Indexer Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update
msrc
CVE-2020-0638HIGHCVSS 7.8KEV2020-01-14
CVE-2020-0638 [HIGH] Update Notification Manager Elevation of Privilege Vulnerability
Update Notification Manager Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way the Update Notification Manager handles files.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability
msrc
CVE-2020-0636HIGHCVSS 7.82020-01-14
CVE-2020-0636 [HIGH] Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Subsystem for Linux handles files. An attacker who successfully exploited the vulnerability could execute code with elevated privileges.
To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a
msrc
CVE-2020-0641HIGHCVSS 7.82020-01-14
CVE-2020-0641 [HIGH] Microsoft Windows Elevation of Privilege Vulnerability
Microsoft Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows Media Service that allows file creation in arbitrary locations.
To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update ad
msrc
CVE-2020-0623HIGHCVSS 7.82020-01-14
CVE-2020-0623 [HIGH] Windows Search Indexer Elevation of Privilege Vulnerability
Windows Search Indexer Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update
msrc
CVE-2020-0624HIGHCVSS 7.8PoC2020-01-14
CVE-2020-0624 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2020-0633HIGHCVSS 7.82020-01-14
CVE-2020-0633 [HIGH] Windows Search Indexer Elevation of Privilege Vulnerability
Windows Search Indexer Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update
msrc
CVE-2020-0614HIGHCVSS 7.82020-01-14
CVE-2020-0614 [HIGH] Windows Search Indexer Elevation of Privilege Vulnerability
Windows Search Indexer Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update
msrc
CVE-2020-0601HIGHCVSS 8.1KEVPoC2020-01-14
CVE-2020-0601 [HIGH] Windows CryptoAPI Spoofing Vulnerability
Windows CryptoAPI Spoofing Vulnerability
Description: A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.
An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. The user would have no way of knowing the file was malicious, bec
msrc