359 matches found
CVE-2020-1559
<p>An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.</p><p>To exploit the vulnerability, an attacker would first need code execution on a victi...
CVE-2020-17070
Windows Update Medic Service Elevation of Privilege Vulnerability
CVE-2020-17076
Windows Update Orchestrator Service Elevation of Privilege Vulnerability
CVE-2020-1033
<p>An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p><p>An authenticated attacker could exploit this vulnerabilit...
CVE-2020-1228
<p>A denial of service vulnerability exists in Windows DNS when it fails to properly handle queries. An attacker who successfully exploited this vulnerability could cause the DNS service to become nonresponsive.</p><p>To exploit the vulnerability, an authenticated attacker could send malicious DNS ...
CVE-2020-1590
<p>An elevation of privilege vulnerability exists when the Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system.</p><p>To exploit the vulnerability, an attac...
CVE-2020-17026
Windows Remote Access Elevation of Privilege Vulnerability
CVE-2020-16854
<p>An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p><p>To exploit this vulnerability, an attacker would have to ...
CVE-2020-16879
<p>An information disclosure vulnerability exists when a Windows Projected Filesystem improperly handles file redirections. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system</p><p>To exploit this vulnerability, an attacker wou...