Msrc Windows Server Version 1909 vulnerabilities

554 known vulnerabilities affecting msrc/windows_server_version_1909.

Total CVEs
554
CISA KEV
7
actively exploited
Public exploits
8
Exploited in wild
9
Severity breakdown
CRITICAL13HIGH407MEDIUM131LOW3

Vulnerabilities

Page 19 of 28
CVE-2020-1203HIGHCVSS 7.82020-06-09
CVE-2020-1203 [HIGH] Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector fail to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit this vulnerability, an attacker woul
msrc
CVE-2020-1276HIGHCVSS 7.82020-06-09
CVE-2020-1276 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2020-1292HIGHCVSS 8.82020-06-09
CVE-2020-1292 [HIGH] OpenSSH for Windows Elevation of Privilege Vulnerability OpenSSH for Windows Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in OpenSSH for Windows when it does not properly restrict access to configuration settings. An attacker who successfully exploited this vulnerability could replace the shell with a malicious binary. To exploit this vulnerability, an authenticated attacker would need to modify the OpenSSH for Windows con
msrc
CVE-2020-1268MEDIUMCVSS 5.52020-06-09
CVE-2020-1268 [MEDIUM] Windows Service Information Disclosure Vulnerability Windows Service Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when a Windows service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application
msrc
CVE-2020-1241MEDIUMCVSS 5.32020-06-09
CVE-2020-1241 [HIGH] Windows Kernel Security Feature Bypass Vulnerability Windows Kernel Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists when Windows Kernel fails to properly sanitize certain parameters. To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. The update addresses the vulnerability by correcting how Windows Kernel handles parameter sanitization. Mi
msrc
CVE-2020-1296MEDIUMCVSS 5.02020-06-09
CVE-2020-1296 [MEDIUM] Windows Diagnostics & feedback Information Disclosure Vulnerability Windows Diagnostics & feedback Information Disclosure Vulnerability Description: A vulnerability exists in the way the Windows Diagnostics & feedback settings app handles objects in memory. An attacker who successfully exploited this vulnerability could cause additional diagnostic data from the affected device to be sent to Microsoft. To exploit the vulnerability, an attacker would have to log on to an af
msrc
CVE-2020-1310MEDIUMCVSS 6.42020-06-09
CVE-2020-1310 [MEDIUM] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulne
msrc
CVE-2020-1232MEDIUMCVSS 6.52020-06-09
CVE-2020-1232 [MEDIUM] Media Foundation Information Disclosure Vulnerability Media Foundation Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log onto an affected system and open a specially crafted file. In a
msrc
CVE-2020-1290MEDIUMCVSS 5.52020-06-09
CVE-2020-1290 [MEDIUM] Win32k Information Disclosure Vulnerability Win32k Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security
msrc
CVE-2020-1258MEDIUMCVSS 6.42020-06-09
CVE-2020-1258 [MEDIUM] DirectX Elevation of Privilege Vulnerability DirectX Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have
msrc
CVE-2020-1197MEDIUMCVSS 6.32020-06-09
CVE-2020-1197 [HIGH] Windows Error Reporting Manager Elevation of Privilege Vulnerability Windows Error Reporting Manager Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash. An attacker who successfully exploited this vulnerability could delete a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An a
msrc
CVE-2020-1259MEDIUMCVSS 4.32020-06-09
CVE-2020-1259 [MEDIUM] Windows Host Guardian Service Security Feature Bypass Vulnerability Windows Host Guardian Service Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists when Windows Host Guardian Service improperly handles hashes recorded and logged. An attacker who successfully exploited the vulnerability could tamper with the log file. In an attack scenario, an attacker can change existing event log types to a type the parsers do not interpret
msrc
CVE-2020-1204MEDIUMCVSS 6.32020-06-09
CVE-2020-1204 [HIGH] Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions. An attacker who successfully exploited this vulnerability could bypass access restrictions to delete files. To exploit this vulnerability, an attacker would first have
msrc
CVE-2020-1244MEDIUMCVSS 6.32020-06-09
CVE-2020-1244 [HIGH] Connected User Experiences and Telemetry Service Denial of Service Vulnerability Connected User Experiences and Telemetry Service Denial of Service Vulnerability Description: A denial of service vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could cause a system to stop responding. To exploit the vulnerability, an attacker would first have to log on to t
msrc
CVE-2020-1261MEDIUMCVSS 5.52020-06-09
CVE-2020-1261 [MEDIUM] Windows Error Reporting Information Disclosure Vulnerability Windows Error Reporting Information Disclosure Vulnerability Description: An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an attacker would have to log on to an affected system and run a special
msrc
CVE-2020-1283MEDIUMCVSS 5.52020-06-09
CVE-2020-1283 [MEDIUM] Windows Denial of Service Vulnerability Windows Denial of Service Vulnerability Description: A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or to convince a user to open a specific file on a network s
msrc
CVE-2020-1090HIGHCVSS 7.82020-05-12
CVE-2020-1090 [HIGH] Windows Runtime Elevation of Privilege Vulnerability Windows Runtime Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnera
msrc
CVE-2020-1151HIGHCVSS 7.02020-05-12
CVE-2020-1151 [HIGH] Windows Runtime Elevation of Privilege Vulnerability Windows Runtime Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnera
msrc
CVE-2020-1186HIGHCVSS 7.82020-05-12
CVE-2020-1186 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability Windows State Repository Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1086HIGHCVSS 7.82020-05-12
CVE-2020-1086 [HIGH] Windows Runtime Elevation of Privilege Vulnerability Windows Runtime Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnera
msrc