Microsoft Vulnerabilities
Comprehensive security vulnerability database for Microsoft products
101
3
94
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2020-1487 | 7.8 | This vulnerability allows an attacker to access sensitive information on a user's system, which could lead to further attacks. To exploit it, the attacker needs the user to open a specially crafted file, often by tricking them into clicking a link in an email or message. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1486 | 7.8 | This vulnerability allows an attacker who has logged into a Windows 10 system to run malicious code with full control over the system, enabling them to install programs, access or delete files, and create new user accounts. To exploit it, the attacker must first be logged on and then run a specially crafted application. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1485 | 5.5 | This vulnerability allows an attacker to access sensitive information from a Windows 10 system by connecting a device like a camera or scanner and running a specially designed application. To exploit this, the attacker must already have access to the system and be able to connect their device to it. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1484 | 7.8 | This vulnerability allows an attacker to gain higher access rights on a Windows 10 system, enabling them to perform actions they normally wouldn't be able to. However, the attacker must first run a malicious program on the victim's computer to exploit this weakness. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1483 | 5.0 | This vulnerability allows an attacker to run harmful code on a user's computer if they can trick the user into opening a specially crafted file in Microsoft Outlook. It’s particularly dangerous for users with administrative rights, as it could let the attacker take full control of the system, install programs, or access sensitive data. | microsoft365 apps | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1480 | 7.8 | This vulnerability allows an attacker to gain full control over a Windows 10 system, enabling them to install software, access or delete files, and create new user accounts with complete rights. However, the attacker must first log into the system and run a specially crafted application to exploit the flaw. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1479 | 7.8 | This vulnerability allows an attacker to gain full control of a Windows 10 system, enabling them to install programs, alter or delete files, and create new user accounts with complete access. However, the attacker must first log in to the system and then run a specially crafted application to exploit the flaw. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1478 | 7.8 | This vulnerability allows an attacker to take control of a user's system, enabling them to install programs, access or delete files, and create new accounts with full rights. To exploit it, the attacker typically needs to trick the user into opening a malicious document or visiting a harmful website. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1477 | 7.0 | An attacker can take control of a victim's computer by exploiting a flaw in Windows Media Foundation, allowing them to install programs, access or delete files, and create new user accounts. This usually requires the victim to open a specially crafted document or visit a malicious website. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1476 | 5.5 | This vulnerability allows an attacker to access restricted files on a web server running ASP.NET or .NET applications if they send a specially crafted request. To exploit this, the attacker needs to target a server that has not been updated to fix this issue. | microsoft.net framework | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1475 | 7.8 | This vulnerability allows an attacker who has already logged into a Windows 10 system to run malicious code with higher permissions than they should have. To exploit it, the attacker needs to execute a specially crafted application on the system. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1474 | 7.8 | This vulnerability allows an attacker to access sensitive information from a Windows 10 system by connecting a device like a camera or scanner and running a specially designed application. To exploit it, the attacker must already have access to the system and be able to connect their imaging device. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1473 | 7.0 | An attacker can take control of a victim's computer by tricking them into opening a specially crafted file, which allows the attacker to run any code they want on that system. This vulnerability specifically affects Windows 10 and relies on the victim's action of opening the malicious file. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1472 | 5.5 | This vulnerability allows an attacker to gain domain administrator access to a Windows Server by exploiting a weak connection method used by the server's authentication system. To do this, the attacker must connect to the server without needing to log in, which means they can potentially take control of the entire network if they are on the same network. | microsoftwindows server 1903 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1470 | 7.8 | This vulnerability allows an attacker to gain higher access rights on a Windows 10 system, potentially letting them control the system more fully. However, the attacker must first run a malicious application on the victim's machine to exploit this weakness. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1467 | 10.0 | This vulnerability allows an attacker to gain elevated privileges on a Windows 10 system, potentially giving them control over important files. However, the attacker must first log in to the system and run a specially designed application to exploit this weakness. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1466 | 7.8 | An attacker can cause the Remote Desktop Gateway service on a Windows Server 2012 to stop working by sending specially crafted requests after connecting to the server using Remote Desktop Protocol (RDP). To exploit this vulnerability, the attacker must be able to connect to the server, which means they need access to the network where the server is located. | microsoftwindows server 2012 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1464 | 7.8 | An attacker can exploit this vulnerability to trick Windows into loading files that aren't properly signed, potentially allowing malicious software to run. This requires the attacker to have access to the system to execute their code, bypassing important security checks that are meant to protect users. | microsoftwindows 10 1507 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1459 | 7.5 | This vulnerability allows an attacker with local access to a Windows 10 device to potentially steal sensitive information by exploiting how the system processes instructions. To take advantage of this flaw, the attacker must run a specially crafted application on the device. | microsoftwindows 10 | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2020-1455 | 5.3 | An attacker can cause Microsoft SQL Server Management Studio to crash, leading to a denial of service that disrupts its functionality. However, they must first have the ability to execute code on the victim's system to exploit this vulnerability. | microsoftsql server management studio | Exploit Available | over 5 years agoAug 17, 2020 |
About Microsoft Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Microsoft products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.