Lucene search

K
MicrosoftWindows 10 170910.0.0

266 matches found

CVE
CVE
added 2020/09/11 5:15 p.m.84 views

CVE-2020-0766

An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.The security...

7.8CVSS8.1AI score0.00512EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.84 views

CVE-2020-1030

An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; ...

7.8CVSS8.1AI score0.02591EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.84 views

CVE-2020-1052

An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could run a specially crafte...

7.8CVSS8.1AI score0.00512EPSS
CVE
CVE
added 2020/10/16 11:15 p.m.84 views

CVE-2020-16976

An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.The ...

7.8CVSS8.2AI score0.00542EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.82 views

CVE-2020-0989

An information disclosure vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions. An attacker who successfully exploited this vulnerability could bypass access restrictions to read files.To exploit this vulnerability, an attacker would first have t...

5.5CVSS6.4AI score0.0093EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.82 views

CVE-2020-1097

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.There are multiple ways an attacker could exploit th...

6.5CVSS6.9AI score0.18021EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.82 views

CVE-2020-1589

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker would have to log on to ...

5.5CVSS5.8AI score0.00435EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.81 views

CVE-2020-0998

An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.In a local attack scenario, an attacker could exploit this vulnerability by r...

7.8CVSS7.9AI score0.00726EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.81 views

CVE-2020-1169

An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.An attacker could exploit this vulnerability by running a specially crafted applica...

7.8CVSS8.1AI score0.08088EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.80 views

CVE-2020-0875

An information disclosure vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system (low-integrity to medium-integrity).This vulnerability by itself does not allow arbitr...

5.5CVSS7.4AI score0.22378EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.80 views

CVE-2020-1250

An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker would have to log on ...

5.5CVSS6.3AI score0.0112EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.79 views

CVE-2020-1252

A remote code execution vulnerability exists when Windows improperly handles objects in memory. To exploit the vulnerability an attacker would have to convince a user to run a specially crafted application.An attacker who successfully exploited this vulnerability could execute arbitrary code and ta...

7.8CVSS8.4AI score0.08862EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.78 views

CVE-2020-0870

An elevation of privilege vulnerability exists when the Shell infrastructure component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.To exploit this vulnerability, an attacker would first have to log on to ...

7.8CVSS8.1AI score0.00713EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.78 views

CVE-2020-1559

An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.To exploit the vulnerability, an attacker would first need code execution on a victim system. ...

7.8CVSS8.2AI score0.00529EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.76 views

CVE-2020-1033

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.An authenticated attacker could exploit this vulnerability by runni...

5.5CVSS4.2AI score0.01063EPSS
CVE
CVE
added 2020/09/11 5:15 p.m.74 views

CVE-2020-16854

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.To exploit this vulnerability, an attacker would have to log on to ...

5.5CVSS5.8AI score0.00746EPSS
Total number of security vulnerabilities266