Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Windows_server_20h2
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 51 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-08-17 | CVE-2020-1472 | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft... | Ubuntu_linux, Debian_linux, Fedora, Windows_server_1903, Windows_server_1909, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_20h2, Leap, Zfs_storage_appliance_kit, Samba, Directory_server | N/A | ||
2021-02-25 | CVE-2021-1732 | Windows Win32k Elevation of Privilege Vulnerability | Windows_10_1803, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_server_1909, Windows_server_2004, Windows_server_2019, Windows_server_20h2 | N/A | ||
2021-04-13 | CVE-2021-28310 | Win32k Elevation of Privilege Vulnerability | Windows_10_1803, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_server_1909, Windows_server_2004, Windows_server_2019, Windows_server_20h2 | N/A | ||
2021-05-11 | CVE-2021-31166 | HTTP Protocol Stack Remote Code Execution Vulnerability | Windows_10_2004, Windows_10_20h2, Windows_server_2004, Windows_server_20h2 | N/A | ||
2021-06-08 | CVE-2021-31199 | Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_20h2 | N/A | ||
2021-06-08 | CVE-2021-31201 | Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_20h2 | N/A | ||
2021-06-08 | CVE-2021-31955 | Windows Kernel Information Disclosure Vulnerability | Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_server_2004, Windows_server_2019, Windows_server_20h2 | N/A | ||
2021-06-08 | CVE-2021-31956 | Windows NTFS Elevation of Privilege Vulnerability | Windows_10, Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2004, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_20h2 | N/A | ||
2021-06-08 | CVE-2021-33739 | Microsoft DWM Core Library Elevation of Privilege Vulnerability | Windows_10_1909, Windows_10_2004, Windows_10_20h2, Windows_10_21h1, Windows_server_2004, Windows_server_20h2 | N/A | ||
2021-07-02 | CVE-2021-34527 | <p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been... | Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Windows_server_2022, Windows_server_20h2 | N/A |