Msrc Windows Server Version 1909 vulnerabilities
554 known vulnerabilities affecting msrc/windows_server_version_1909.
Total CVEs
554
CISA KEV
7
actively exploited
Public exploits
8
Exploited in wild
9
Severity breakdown
CRITICAL13HIGH407MEDIUM131LOW3
Vulnerabilities
Page 28 of 28
CVE-2020-0624HIGHCVSS 7.8PoC2020-01-14
CVE-2020-0624 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2020-0633HIGHCVSS 7.82020-01-14
CVE-2020-0633 [HIGH] Windows Search Indexer Elevation of Privilege Vulnerability
Windows Search Indexer Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update
msrc
CVE-2020-0614HIGHCVSS 7.82020-01-14
CVE-2020-0614 [HIGH] Windows Search Indexer Elevation of Privilege Vulnerability
Windows Search Indexer Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update
msrc
CVE-2020-0601HIGHCVSS 8.1KEVPoC2020-01-14
CVE-2020-0601 [HIGH] Windows CryptoAPI Spoofing Vulnerability
Windows CryptoAPI Spoofing Vulnerability
Description: A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.
An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. The user would have no way of knowing the file was malicious, bec
msrc
CVE-2020-0644HIGHCVSS 7.82020-01-14
CVE-2020-0644 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Microsoft Windows implements predictable memory section names. An attacker who successfully exploited this vulnerability could run arbitrary code as system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit the vulnerability, an attacker would f
msrc
CVE-2020-0616MEDIUMCVSS 5.52020-01-14
CVE-2020-0616 [MEDIUM] Microsoft Windows Denial of Service Vulnerability
Microsoft Windows Denial of Service Vulnerability
Description: A denial of service vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would allow an attacker to o
msrc
CVE-2019-1471HIGHCVSS 8.22019-12-10
CVE-2019-1471 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.
msrc
CVE-2019-1476HIGHCVSS 7.8PoC2019-12-10
CVE-2019-1476 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data.
To exploit this vulnerability, an attacker would first have to log on to the s
msrc
CVE-2019-1483HIGHCVSS 7.82019-12-10
CVE-2019-1483 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how AppX Deplo
msrc
CVE-2019-1472MEDIUMCVSS 5.52019-12-10
CVE-2019-1472 [MEDIUM] Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
msrc
CVE-2019-1469MEDIUMCVSS 5.52019-12-10
CVE-2019-1469 [MEDIUM] Win32k Information Disclosure Vulnerability
Win32k Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
The security
msrc
CVE-2019-1226CRITICALCVSS 9.82019-08-13
CVE-2019-1226 [CRITICAL] Remote Desktop Services Remote Code Execution Vulnerability
Remote Desktop Services Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this
msrc
CVE-2019-1225HIGHCVSS 7.5Exploited2019-08-13
CVE-2019-1225 [HIGH] Remote Desktop Protocol Server Information Disclosure Vulnerability
Remote Desktop Protocol Server Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows RDP server improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system.
To exploit this vulnerability, an attacker would have to connect remotely to an affected
msrc
CVE-2019-1224HIGHCVSS 7.5Exploited2019-08-13
CVE-2019-1224 [HIGH] Remote Desktop Protocol Server Information Disclosure Vulnerability
Remote Desktop Protocol Server Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows RDP server improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system.
To exploit this vulnerability, an attacker would have to connect remotely to an affected
msrc
← Previous28 / 28