Filtered by vendor Microsoft
Subscriptions
Total
22837 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2020-16998 | 1 Microsoft | 13 Windows 10, Windows 10 1507, Windows 10 1607 and 10 more | 2024-11-21 | 7 High |
| DirectX Elevation of Privilege Vulnerability | ||||
| CVE-2020-16997 | 1 Microsoft | 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more | 2024-11-21 | 7.7 High |
| Remote Desktop Protocol Server Information Disclosure Vulnerability | ||||
| CVE-2020-16995 | 1 Microsoft | 1 Network Watcher Agent | 2024-11-21 | 7.8 High |
| <p>An elevation of privilege vulnerability exists in Network Watcher Agent virtual machine extension for Linux. An attacker who successfully exploited this vulnerability could execute code with elevated privileges.</p> <p>To exploit this vulnerability, an attacker would have to be present as a user on the affected virtual machine.</p> <p>The security update addresses this vulnerability by correcting how Network Watcher Agent virtual machine extension for Linux executes with elevated privileges.</p> | ||||
| CVE-2020-16994 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 7.3 High |
| Azure Sphere Unsigned Code Execution Vulnerability | ||||
| CVE-2020-16993 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 5.4 Medium |
| Azure Sphere Elevation of Privilege Vulnerability | ||||
| CVE-2020-16992 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 7.5 High |
| Azure Sphere Elevation of Privilege Vulnerability | ||||
| CVE-2020-16991 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 7.3 High |
| Azure Sphere Unsigned Code Execution Vulnerability | ||||
| CVE-2020-16990 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 6.2 Medium |
| Azure Sphere Information Disclosure Vulnerability | ||||
| CVE-2020-16989 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 5.4 Medium |
| Azure Sphere Elevation of Privilege Vulnerability | ||||
| CVE-2020-16988 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 6.9 Medium |
| Azure Sphere Elevation of Privilege Vulnerability | ||||
| CVE-2020-16987 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 7.3 High |
| Azure Sphere Unsigned Code Execution Vulnerability | ||||
| CVE-2020-16986 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 6.2 Medium |
| Azure Sphere Denial of Service Vulnerability | ||||
| CVE-2020-16985 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 6.2 Medium |
| Azure Sphere Information Disclosure Vulnerability | ||||
| CVE-2020-16984 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 7.3 High |
| Azure Sphere Unsigned Code Execution Vulnerability | ||||
| CVE-2020-16983 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 5.7 Medium |
| Azure Sphere Tampering Vulnerability | ||||
| CVE-2020-16982 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 6.1 Medium |
| Azure Sphere Unsigned Code Execution Vulnerability | ||||
| CVE-2020-16981 | 1 Microsoft | 1 Azure Sphere | 2024-11-21 | 6.1 Medium |
| Azure Sphere Elevation of Privilege Vulnerability | ||||
| CVE-2020-16980 | 1 Microsoft | 7 Windows Server 1903, Windows Server 1909, Windows Server 2004 and 4 more | 2024-11-21 | 7.8 High |
| <p>An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.</p> <p>To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows iSCSI Target Service properly handles file operations.</p> | ||||
| CVE-2020-16979 | 1 Microsoft | 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server | 2024-11-21 | 5.3 Medium |
| Microsoft SharePoint Information Disclosure Vulnerability | ||||
| CVE-2020-16978 | 1 Microsoft | 1 Dynamics 365 | 2024-11-21 | 5.4 Medium |
| <p>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected Dynamics server.</p> <p>The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current authenticated user. These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions within Dynamics Server on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.</p> <p>The security update addresses the vulnerability by helping to ensure that Dynamics Server properly sanitizes web requests.</p> | ||||