Show filters
1,068 Total Results
Displaying 41-50 of 1,068
Sort by:
Attacker Value
Very Low
CVE-2020-1094
Disclosure Date: April 15, 2020 (last updated November 27, 2024)
An elevation of privilege vulnerability exists when the Windows Work Folder Service improperly handles file operations, aka 'Windows Work Folder Service Elevation of Privilege Vulnerability'.
0
Attacker Value
Low
CVE-2020-0754
Disclosure Date: February 11, 2020 (last updated November 27, 2024)
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0753.
0
Attacker Value
Very High
CVE-2020-0665
Disclosure Date: February 11, 2020 (last updated November 27, 2024)
An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest, aka 'Active Directory Elevation of Privilege Vulnerability'.
0
Attacker Value
Moderate
Remote Desktop Client remote code execution vulnerability
Disclosure Date: January 14, 2020 (last updated November 27, 2024)
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server, aka 'Remote Desktop Client Remote Code Execution Vulnerability'.
0
Attacker Value
Unknown
CVE-2020-1472
Disclosure Date: August 17, 2020 (last updated February 21, 2025)
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.
To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access.
Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels.
For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020).
When the second phase of Windows updates become available in Q1 2021, customers…
1
Attacker Value
Unknown
CVE-2021-31191
Disclosure Date: May 11, 2021 (last updated November 28, 2024)
Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
0
Attacker Value
Unknown
CVE-2020-17162
Disclosure Date: February 25, 2021 (last updated November 28, 2024)
Microsoft Windows Security Feature Bypass Vulnerability
0
Attacker Value
Unknown
CVE-2020-16996
Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Kerberos Security Feature Bypass Vulnerability
0
Attacker Value
Unknown
CVE-2020-17098
Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Windows GDI+ Information Disclosure Vulnerability
0
Attacker Value
Unknown
CVE-2020-17103
Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
0