A vulnerability, which was classified as critical, was found in Microsoft Exchange Server 2013 CU23/2016 CU17/2016 CU18/2019 CU6/2019 CU7. This affects an unknown part. Executing manipulation can lead to privilege escalation.
This vulnerability is handled as CVE-2020-17117. The attack can be executed remotely. There is not any exploit available.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft Windows. It has been declared as problematic. The affected element is an unknown function of the component GDI+. Such manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2020-17098. The attack can only be performed from a local environment. No exploit is available.
It is best practice to apply a patch to resolve this issue.
A vulnerability marked as critical has been reported in Microsoft Excel up to 2019. Affected by this vulnerability is an unknown functionality. This manipulation causes Remote Code Execution.
This vulnerability is registered as CVE-2020-17123. Remote exploitation of the attack is possible. No exploit is available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability described as problematic has been identified in Microsoft Outlook up to 2019. Affected by this issue is some unknown functionality. Such manipulation leads to information disclosure.
This vulnerability is documented as CVE-2020-17119. The attack can be executed remotely. There is not any exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability, which was classified as critical, was found in Microsoft Office, Office Web Apps and SharePoint Server 2010 SP2. Impacted is an unknown function. The manipulation results in Remote Code Execution.
This vulnerability is known as CVE-2020-17122. It is possible to launch the attack remotely. No exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability has been found in Microsoft SharePoint 2010 SP2/2013 SP1/2016/2019 and classified as critical. The affected element is an unknown function. This manipulation causes improper input validation.
This vulnerability is handled as CVE-2020-17115. The attack can be initiated remotely. There is not any exploit available.
It is suggested to install a patch to address this issue.
A vulnerability was found in Microsoft SharePoint 2010 SP1/2013 SP1/2016/2019 and classified as problematic. The impacted element is an unknown function. Such manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2020-17120. The attack can be launched remotely. No exploit exists.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft SharePoint 2010 SP2/2013 SP1/2016/2019. It has been classified as critical. This affects an unknown function. Performing manipulation results in privilege escalation.
This vulnerability was named CVE-2020-17121. The attack may be initiated remotely. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in Microsoft SharePoint 2010 SP2/2013 SP1/2016/2019. It has been declared as critical. This impacts an unknown function. Executing manipulation can lead to an unknown weakness.
The identification of this vulnerability is CVE-2020-17118. The attack may be launched remotely. There is no exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability classified as critical has been found in Microsoft Windows. Impacted is an unknown function of the component Cloud Files Mini Filter Driver. The manipulation leads to improper privilege management.
This vulnerability is documented as CVE-2020-17103. The attack needs to be performed locally. There is not any exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability classified as critical was found in Microsoft Windows up to Server 2019. This impacts an unknown function of the component Lock Screen. Such manipulation leads to improper authentication.
This vulnerability is documented as CVE-2020-17099. The attack can be executed directly on the physical device. There is not any exploit available.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft C SDK for Azure IoT and classified as critical. Affected by this issue is some unknown functionality. Executing manipulation can lead to protection mechanism failure.
The identification of this vulnerability is CVE-2020-17002. The attack may be launched remotely. There is no exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in Microsoft SharePoint 2010 SP2/2013 SP1/2016/2019. It has been rated as critical. Affected is an unknown function. The manipulation leads to improper privilege management.
This vulnerability is referenced as CVE-2020-17089. Remote exploitation of the attack is possible. No exploit is available.
Applying a patch is the recommended action to fix this issue.
A vulnerability identified as critical has been detected in Microsoft Windows Server 2012 up to Server 2016. Affected by this issue is some unknown functionality of the component Kerberos. This manipulation causes protection mechanism failure.
This vulnerability is tracked as CVE-2020-16996. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to apply a patch to fix this issue.
A vulnerability marked as critical has been reported in Microsoft Windows. This vulnerability affects unknown code of the component Network Connections Service. Performing manipulation results in improper privilege management.
This vulnerability is cataloged as CVE-2020-17092. The attack must be initiated from a local position. There is no exploit available.
It is suggested to install a patch to address this issue.
A vulnerability was found in Microsoft Windows. It has been classified as critical. Affected by this vulnerability is an unknown functionality of the component Backup Engine. The manipulation leads to improper privilege management.
This vulnerability is uniquely identified as CVE-2020-16960. Local access is required to approach this attack. No exploit exists.
It is suggested to install a patch to address this issue.
A vulnerability was found in Microsoft Windows. It has been declared as critical. Affected by this issue is some unknown functionality of the component Backup Engine. The manipulation results in improper privilege management.
This vulnerability was named CVE-2020-16958. The attack needs to be approached locally. There is no available exploit.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft Windows. It has been rated as critical. This affects an unknown part of the component Backup Engine. This manipulation causes improper privilege management.
The identification of this vulnerability is CVE-2020-16959. The attack can only be executed locally. There is no exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability categorized as critical has been discovered in Microsoft Windows. This vulnerability affects unknown code of the component Backup Engine. Such manipulation leads to improper privilege management.
This vulnerability is referenced as CVE-2020-16961. The attack can only be performed from a local environment. No exploit is available.
It is advisable to implement a patch to correct this issue.