Vulnerabilities > Microsoft > Windows Server 2019 > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-11-11 | CVE-2020-17014 | Unspecified vulnerability in Microsoft products Windows Print Spooler Elevation of Privilege Vulnerability | 7.8 |
2020-11-11 | CVE-2020-17011 | Unspecified vulnerability in Microsoft products Windows Port Class Library Elevation of Privilege Vulnerability | 7.8 |
2020-11-11 | CVE-2020-17007 | Unspecified vulnerability in Microsoft products Windows Error Reporting Elevation of Privilege Vulnerability | 7.0 |
2020-11-11 | CVE-2020-17001 | Unspecified vulnerability in Microsoft products Windows Print Spooler Elevation of Privilege Vulnerability | 7.8 |
2020-11-11 | CVE-2020-16998 | Unspecified vulnerability in Microsoft products DirectX Elevation of Privilege Vulnerability | 7.0 |
2020-11-11 | CVE-2020-16997 | Unspecified vulnerability in Microsoft products Remote Desktop Protocol Server Information Disclosure Vulnerability | 7.7 |
2020-10-16 | CVE-2020-16980 | Unspecified vulnerability in Microsoft products <p>An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations. | 7.8 |
2020-10-16 | CVE-2020-16976 | Unspecified vulnerability in Microsoft products <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. | 7.8 |
2020-10-16 | CVE-2020-16975 | Unspecified vulnerability in Microsoft products <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. | 7.8 |
2020-10-16 | CVE-2020-16974 | Unspecified vulnerability in Microsoft products <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. | 7.8 |