A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory, aka "Windows Deployment Services TFTP Server Remote Code Execution Vulnerability." This affects Windows Server 2012 R2, Windows Server 2008, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows Server 2008 R2, Windows 10 Servers.
Max CVSS
10.0
EPSS Score
41.77%
Published
2018-11-14
Updated
2020-02-13
A remote code execution vulnerability exists in Windows Domain Name System (DNS) servers when they fail to properly handle requests, aka "Windows DNS Server Heap Overflow Vulnerability." This affects Windows Server 2012 R2, Windows Server 2019, Windows Server 2016, Windows 10, Windows 10 Servers.
Max CVSS
10.0
EPSS Score
2.70%
Published
2018-12-12
Updated
2020-08-24
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1182, CVE-2019-1222, CVE-2019-1226.
Max CVSS
10.0
EPSS Score
13.13%
Published
2019-08-14
Updated
2020-08-24
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1181, CVE-2019-1222, CVE-2019-1226.
Max CVSS
10.0
EPSS Score
13.13%
Published
2019-08-14
Updated
2020-08-24
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1181, CVE-2019-1182, CVE-2019-1226.
Max CVSS
10.0
EPSS Score
13.13%
Published
2019-08-14
Updated
2020-08-24
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1181, CVE-2019-1182, CVE-2019-1222.
Max CVSS
10.0
EPSS Score
13.13%
Published
2019-08-14
Updated
2020-08-24
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0610.
Max CVSS
10.0
EPSS Score
42.18%
Published
2020-01-14
Updated
2021-07-21
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0609.
Max CVSS
10.0
EPSS Score
42.18%
Published
2020-01-14
Updated
2021-07-21
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Elevation of Privilege Vulnerability'.
Max CVSS
10.0
EPSS Score
0.46%
Published
2020-03-12
Updated
2021-07-21

CVE-2020-1350

Known exploited
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.
Max CVSS
10.0
EPSS Score
94.46%
Published
2020-07-14
Updated
2022-07-12
CISA KEV Added
2021-11-03
An elevation of privilege vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows handles hard links.
Max CVSS
10.0
EPSS Score
0.45%
Published
2020-08-17
Updated
2024-01-19

CVE-2020-1472

Known exploited
Public exploit
Used for ransomware
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
Max CVSS
10.0
EPSS Score
45.08%
Published
2020-08-17
Updated
2024-01-19
CISA KEV Added
2021-11-03
Windows Network File System Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
3.50%
Published
2020-11-11
Updated
2023-12-31
Windows DNS Server Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
5.19%
Published
2021-03-11
Updated
2023-12-29
Windows DNS Server Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
5.19%
Published
2021-03-11
Updated
2023-12-29
Windows DNS Server Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
5.19%
Published
2021-03-11
Updated
2023-12-29
Windows Security Center API Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
2.27%
Published
2022-01-11
Updated
2023-12-21
DirectX Graphics Kernel Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
2.27%
Published
2022-01-11
Updated
2023-12-21
HTTP Protocol Stack Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
84.04%
Published
2022-01-11
Updated
2023-12-21
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
1.56%
Published
2022-04-15
Updated
2023-06-29
Windows Network File System Remote Code Execution Vulnerability
Max CVSS
10.0
EPSS Score
88.91%
Published
2022-06-15
Updated
2023-12-20
An elevation of privilege vulnerability exists when Microsoft IIS Server fails to check the length of a buffer prior to copying memory to it.An attacker who successfully exploited this vulnerability can allow an unprivileged function ran by the user to execute code in the context of NT AUTHORITY\system escaping the Sandbox.The security update addresses the vulnerability by correcting how Microsoft IIS Server sanitizes web requests., aka 'Microsoft IIS Server Elevation of Privilege Vulnerability'.
Max CVSS
9.9
EPSS Score
0.18%
Published
2019-10-10
Updated
2020-08-24
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.To exploit this vulnerability, an attacker could send a specially crafted authentication request, aka 'Microsoft Windows Security Feature Bypass Vulnerability'.
Max CVSS
9.9
EPSS Score
0.16%
Published
2019-11-12
Updated
2020-08-24
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) IIS module improperly handles uploaded content, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
Max CVSS
9.9
EPSS Score
0.24%
Published
2020-05-21
Updated
2020-05-29
Windows Hyper-V Remote Code Execution Vulnerability
Max CVSS
9.9
EPSS Score
0.98%
Published
2020-12-10
Updated
2023-12-30
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!