Vulnerabilities > Microsoft > High

DATE CVE VULNERABILITY TITLE RISK
2020-01-14 CVE-2020-0611 Unspecified vulnerability in Microsoft products
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server, aka 'Remote Desktop Client Remote Code Execution Vulnerability'.
network
high complexity
microsoft
7.5
2020-01-14 CVE-2020-0606 Improper Input Validation vulnerability in Microsoft .Net Core and .Net Framework
A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'.
network
low complexity
microsoft CWE-20
8.8
2020-01-14 CVE-2020-0605 Improper Input Validation vulnerability in Microsoft .Net Core and .Net Framework
A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'.
network
low complexity
microsoft CWE-20
8.8
2020-01-14 CVE-2020-0603 Out-of-bounds Write vulnerability in multiple products
A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka 'ASP.NET Core Remote Code Execution Vulnerability'.
network
low complexity
microsoft redhat CWE-787
8.8
2020-01-14 CVE-2020-0602 A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka 'ASP.NET Core Denial of Service Vulnerability'.
network
low complexity
microsoft redhat
7.5
2020-01-14 CVE-2020-0601 Improper Certificate Validation vulnerability in multiple products
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
network
low complexity
microsoft golang CWE-295
8.1
2019-12-10 CVE-2019-1489 Information Exposure vulnerability in Microsoft Windows XP
An information disclosure vulnerability exists when the Windows Remote Desktop Protocol (RDP) fails to properly handle objects in memory, aka 'Remote Desktop Protocol Information Disclosure Vulnerability'.
network
low complexity
microsoft CWE-200
7.5
2019-12-10 CVE-2019-1485 Out-of-bounds Write vulnerability in Microsoft Internet Explorer 10/11/9
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'.
network
high complexity
microsoft CWE-787
7.5
2019-12-10 CVE-2019-1484 Improper Input Validation vulnerability in Microsoft products
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OLE Remote Code Execution Vulnerability'.
local
low complexity
microsoft CWE-20
7.8
2019-12-10 CVE-2019-1483 Link Following vulnerability in Microsoft products
An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'.
local
low complexity
microsoft CWE-59
7.8