A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0610.
Max CVSS
10.0
EPSS Score
42.18%
Published
2020-01-14
Updated
2021-07-21
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0609.
Max CVSS
10.0
EPSS Score
42.18%
Published
2020-01-14
Updated
2021-07-21

CVE-2020-0646

Known exploited
Public exploit
A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.
Max CVSS
10.0
EPSS Score
97.47%
Published
2020-01-14
Updated
2022-07-12
CISA KEV Added
2021-11-03
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Elevation of Privilege Vulnerability'.
Max CVSS
10.0
EPSS Score
0.46%
Published
2020-03-12
Updated
2021-07-21

CVE-2020-0796

Known exploited
Public exploit
Used for ransomware
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
Max CVSS
10.0
EPSS Score
97.48%
Published
2020-03-12
Updated
2022-04-22
CISA KEV Added
2022-02-10

CVE-2020-1350

Known exploited
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.
Max CVSS
10.0
EPSS Score
94.46%
Published
2020-07-14
Updated
2022-07-12
CISA KEV Added
2021-11-03
An elevation of privilege vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows handles hard links.
Max CVSS
10.0
EPSS Score
0.45%
Published
2020-08-17
Updated
2024-01-19

CVE-2020-1472

Known exploited
Public exploit
Used for ransomware
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
Max CVSS
10.0
EPSS Score
45.08%
Published
2020-08-17
Updated
2024-01-19
CISA KEV Added
2021-11-03
Windows Network File System Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
3.50%
Published
2020-11-11
Updated
2023-12-31
AV1 Video Extension Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
1.12%
Published
2020-11-11
Updated
2023-12-31
Microsoft SharePoint Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
2.98%
Published
2020-12-10
Updated
2023-12-30
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) IIS module improperly handles uploaded content, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
Max CVSS
9.9
EPSS Score
0.24%
Published
2020-05-21
Updated
2020-05-29
<p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.</p> <p>The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.</p>
Max CVSS
9.9
EPSS Score
1.31%
Published
2020-09-11
Updated
2023-12-31
<p>A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user access a susceptible API on an affected version of SharePoint with specially-formatted input.</p> <p>The security update addresses the vulnerability by correcting how SharePoint handles deserialization of untrusted data.</p>
Max CVSS
9.9
EPSS Score
1.31%
Published
2020-09-11
Updated
2023-12-31
Windows Hyper-V Remote Code Execution Vulnerability
Max CVSS
9.9
EPSS Score
0.98%
Published
2020-12-10
Updated
2023-12-30
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.
Max CVSS
9.8
EPSS Score
3.48%
Published
2020-05-21
Updated
2021-07-21
An elevation of privilege vulnerability exists in Service Fabric File Store Service under certain conditions, aka 'Service Fabric Elevation of Privilege'.
Max CVSS
9.8
EPSS Score
0.46%
Published
2020-03-12
Updated
2021-07-21
<p>An elevation of privilege vulnerability exists when Microsoft SharePoint Server and Skype for Business Server improperly handle OAuth token validation. An attacker who successfully exploited the vulnerability could bypass authentication and achieve improper access.</p> <p>To exploit this vulnerability, an attacker would need to modify the token.</p> <p>The update addresses the vulnerability by modifying how Microsoft SharePoint Server and Skype for Business Server validate tokens.</p>
Max CVSS
9.8
EPSS Score
0.45%
Published
2020-07-14
Updated
2024-01-09
A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library’s Elliptic Curve Cryptography (ECC) implementation.An attacker could potentially abuse these bugs to learn information about a server’s private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation, aka 'MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability'.
Max CVSS
9.8
EPSS Score
0.69%
Published
2020-04-15
Updated
2021-07-21
<p>An elevation of privilege vulnerability exists in the way Azure Functions validate access keys.</p> <p>An unauthenticated attacker who successfully exploited this vulnerability could invoke an HTTP Function without proper authorization.</p> <p>This security update addresses the vulnerability by correctly validating access keys used to access HTTP Functions.</p>
Max CVSS
9.8
EPSS Score
0.19%
Published
2020-10-16
Updated
2023-12-31
Windows Hyper-V Security Feature Bypass Vulnerability
Max CVSS
9.8
EPSS Score
0.20%
Published
2020-11-11
Updated
2023-12-31
Raw Image Extension Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
1.12%
Published
2020-11-11
Updated
2023-12-31
Raw Image Extension Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
1.12%
Published
2020-11-11
Updated
2023-12-31
Raw Image Extension Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
1.12%
Published
2020-11-11
Updated
2023-12-31
Raw Image Extension Remote Code Execution Vulnerability
Max CVSS
9.8
EPSS Score
1.12%
Published
2020-11-11
Updated
2023-12-31
1275 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!