Vulnerabilities
Vulnerable Software
Microsoft:  >> Windows 10  >> 1607  Security Vulnerabilities
Windows Remote Access Elevation of Privilege Vulnerability
CVSS Score
7.8
EPSS Score
0.005
Published
2020-11-11
Remote Desktop Protocol Server Information Disclosure Vulnerability
CVSS Score
7.7
EPSS Score
0.032
Published
2020-11-11
DirectX Elevation of Privilege Vulnerability
CVSS Score
7.0
EPSS Score
0.004
Published
2020-11-11
Windows WalletService Information Disclosure Vulnerability
CVSS Score
5.5
EPSS Score
0.004
Published
2020-11-11
Remote Desktop Protocol Client Information Disclosure Vulnerability
CVSS Score
5.5
EPSS Score
0.005
Published
2020-11-11
Windows Print Spooler Elevation of Privilege Vulnerability
CVSS Score
7.8
EPSS Score
0.005
Published
2020-11-11
Windows Graphics Component Information Disclosure Vulnerability
CVSS Score
5.5
EPSS Score
0.004
Published
2020-11-11
<p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.</p> <p>The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.</p>
CVSS Score
7.8
EPSS Score
0.006
Published
2020-10-16
<p>A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.</p> <p>To exploit the vulnerability, a user would have to open a specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.</p>
CVSS Score
7.8
EPSS Score
0.109
Published
2020-10-16
<p>A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.</p> <p>To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.</p> <p>The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.</p>
CVSS Score
7.8
EPSS Score
0.005
Published
2020-10-16


Contact Us

Shodan ® - All rights reserved