Msrc Windows Server Version 2004 vulnerabilities

499 known vulnerabilities affecting msrc/windows_server_version_2004.

Total CVEs
499
CISA KEV
15
actively exploited
Public exploits
6
Exploited in wild
15
Severity breakdown
CRITICAL15HIGH346MEDIUM137LOW1

Vulnerabilities

Page 19 of 25
CVE-2020-1590MEDIUMCVSS 5.52020-09-08
CVE-2020-1590 [MEDIUM] Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attack
msrc
CVE-2020-0664MEDIUMCVSS 6.52020-09-08
CVE-2020-0664 [MEDIUM] Active Directory Information Disclosure Vulnerability Active Directory Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited this vulnerability would be able to read sensitive information about the target system. To exploit this condition, an authenticated attacker would need to send a specially crafted
msrc
CVE-2020-1159MEDIUMCVSS 5.32020-09-08
CVE-2020-1159 [MEDIUM] Windows Elevation of Privilege Vulnerability Windows Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles file creation in protected locations. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the
msrc
CVE-2020-0951MEDIUMCVSS 6.72020-09-08
CVE-2020-0951 [MEDIUM] Windows Defender Application Control Security Feature Bypass Vulnerability Windows Defender Application Control Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC. To exploit the vulnerability, an attac
msrc
CVE-2020-0989MEDIUMCVSS 5.52020-09-08
CVE-2020-0989 [MEDIUM] Windows Mobile Device Management Diagnostics Information Disclosure Vulnerability Windows Mobile Device Management Diagnostics Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions. An attacker who successfully exploited this vulnerability could bypass access restrictions to read files. To exploit this vulnerability, an attacker would first have
msrc
CVE-2020-0914MEDIUMCVSS 5.52020-09-08
CVE-2020-0914 [MEDIUM] Windows State Repository Service Information Disclosure Vulnerability Windows State Repository Service Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An attacker could exploit this vulnerability by running a specially craf
msrc
CVE-2020-0928MEDIUMCVSS 5.52020-09-08
CVE-2020-0928 [MEDIUM] Windows Kernel Information Disclosure Vulnerability Windows Kernel Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
msrc
CVE-2020-1472CRITICALCVSS 10.0KEVPoC2020-08-11
CVE-2020-1472 [MEDIUM] Netlogon Elevation of Privilege Vulnerability Netlogon Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated a
msrc
CVE-2020-1526HIGHCVSS 7.82020-08-11
CVE-2020-1526 [HIGH] Windows Network Connection Broker Elevation of Privilege Vulnerability Windows Network Connection Broker Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Network Connection Broker improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addr
msrc
CVE-2020-1492HIGHCVSS 7.82020-08-11
CVE-2020-1492 [HIGH] Media Foundation Memory Corruption Vulnerability Media Foundation Memory Corruption Vulnerability Description: A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to
msrc
CVE-2020-1556HIGHCVSS 7.82020-08-11
CVE-2020-1556 [HIGH] Windows WalletService Elevation of Privilege Vulnerability Windows WalletService Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update ad
msrc
CVE-2020-1548HIGHCVSS 7.82020-08-11
CVE-2020-1548 [HIGH] Windows WaasMedic Service Information Disclosure Vulnerability Windows WaasMedic Service Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows WaasMedic Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to improperly disclose memory. The security update addresses the vulner
msrc
CVE-2020-1553HIGHCVSS 7.82020-08-11
CVE-2020-1553 [HIGH] Windows Runtime Elevation of Privilege Vulnerability Windows Runtime Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnera
msrc
CVE-2020-1560HIGHCVSS 7.32020-08-11
CVE-2020-1560 [HIGH] Microsoft Windows Codecs Library Remote Code Execution Vulnerability Microsoft Windows Codecs Library Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full u
msrc
CVE-2020-1533HIGHCVSS 7.82020-08-11
CVE-2020-1533 [HIGH] Windows WalletService Elevation of Privilege Vulnerability Windows WalletService Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update ad
msrc
CVE-2020-1417HIGHCVSS 7.82020-08-11
CVE-2020-1417 [MEDIUM] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerabilit
msrc
CVE-2020-1531HIGHCVSS 7.82020-08-11
CVE-2020-1531 [HIGH] Windows Accounts Control Elevation of Privilege Vulnerability Windows Accounts Control Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Accounts Control improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by
msrc
CVE-2020-1528HIGHCVSS 7.82020-08-11
CVE-2020-1528 [HIGH] Windows Radio Manager API Elevation of Privilege Vulnerability Windows Radio Manager API Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Radio Manager API improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability
msrc
CVE-2020-1522HIGHCVSS 7.82020-08-11
CVE-2020-1522 [HIGH] Windows Speech Runtime Elevation of Privilege Vulnerability Windows Speech Runtime Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Speech Runtime improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correc
msrc
CVE-2020-1524HIGHCVSS 7.82020-08-11
CVE-2020-1524 [HIGH] Windows Speech Shell Components Elevation of Privilege Vulnerability Windows Speech Shell Components Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Speech Shell Components improperly handle memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses t
msrc