Vulnerabilidades CVE
Base de datos de vulnerabilidades CVE enriquecida con datos de CISA KEV y NVD
| CVE ID | CVSS | Severidad | KEV | Avistamientos |
|---|---|---|---|---|
| CVE-2020-1482 <p>A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated atta... | 6.3 | MEDIUM | β | 0 |
| CVE-2020-1491 <p>An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory. An attacker who successfully exploited the vulnerability could execu... | 7.8 | HIGH | β | 0 |
| CVE-2020-1506 <p>An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated p... | 6.1 | MEDIUM | β | 0 |
| CVE-2026-25362 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FooPlugins FooGallery foogallery allows Stored XSS.This issue affects FooGallery: from n/a through... | 5.9 | MEDIUM | β | 0 |
| CVE-2020-1507 <p>An elevation of privilege vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could gain elevated priv... | 7.9 | HIGH | β | 0 |
| CVE-2020-1508 <p>A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected ... | 7.6 | HIGH | β | 0 |
| CVE-2020-1514 <p>A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated atta... | 5.4 | MEDIUM | β | 0 |
| CVE-2020-1523 <p>A tampering vulnerability exists when Microsoft SharePoint Server fails to properly handle profile data. An attacker who successfully exploited this vulnerability could modify a targeted user's pro... | 8.9 | HIGH | β | 0 |
| CVE-2020-1532 <p>An elevation of privilege vulnerability exists when the Windows InstallService improperly handles memory.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the... | 7.8 | HIGH | β | 0 |
| CVE-2020-1575 <p>A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated atta... | 5.4 | MEDIUM | β | 0 |
| CVE-2020-1576 <p>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnera... | 8.5 | HIGH | β | 0 |
| CVE-2020-1589 <p>An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to fu... | 4.4 | MEDIUM | β | 0 |
| CVE-2020-1590 <p>An elevation of privilege vulnerability exists when the Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerabilit... | 6.6 | MEDIUM | β | 0 |
| CVE-2020-1592 <p>An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.</p> <p>To exploit this vulnerability, an authenticated attacker could run a speciall... | 4.4 | MEDIUM | β | 0 |
| CVE-2020-1594 <p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could... | 7.8 | HIGH | β | 0 |
| CVE-2020-1595 <p>A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input. An attacker who successfully exploited the vulnerability could run ... | 9.9 | CRITICAL | β | 0 |
| CVE-2020-1596 <p>A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise ... | 5.4 | MEDIUM | β | 0 |
| CVE-2020-1598 <p>An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory. An attacker who successfully exploited this vulnerabilit... | 6.1 | MEDIUM | β | 0 |
| CVE-2020-0764 <p>An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated pri... | 7.8 | HIGH | β | 0 |
| CVE-2020-16863 <p>A denial of service vulnerability exists in Windows Remote Desktop Service when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfull... | 7.5 | HIGH | β | 0 |
| CVE-2020-16876 <p>An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations. An attacker who successfully exploited this vulnerab... | 7.1 | HIGH | β | 0 |
| CVE-2020-16877 <p>An elevation of privilege vulnerability exists when Microsoft Windows improperly handles reparse points. An attacker who successfully exploited this vulnerability could overwrite or delete a target... | 7.1 | HIGH | β | 0 |
| CVE-2020-16885 <p>An elevation of privilege vulnerability exists when the Windows Storage VSP Driver improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated ... | 7.8 | HIGH | β | 0 |
| CVE-2020-16886 <p>A security feature bypass vulnerability exists in the PowerShellGet V2 module. An attacker who successfully exploited this vulnerability could bypass WDAC (Windows Defender Application Control) pol... | 5.3 | MEDIUM | β | 0 |
| CVE-2020-16890 <p>An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code... | 7.8 | HIGH | β | 0 |
| CVE-2020-16891 <p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerabil... | 8.8 | HIGH | β | 0 |
| CVE-2020-16892 <p>An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with e... | 7.8 | HIGH | β | 0 |
| CVE-2020-16894 <p>A denial of service vulnerability exists when Windows Network Address Translation (NAT) on a host server fails to properly validate input from a privileged user on a guest operating system. An atta... | 7.7 | HIGH | β | 0 |
| CVE-2020-16895 <p>An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash. An attacker who successfully exploited this vulnerability could delete a targ... | 7.8 | HIGH | β | 0 |
| CVE-2020-16897 <p>An information disclosure vulnerability exists when NetBIOS over TCP (NBT) Extensions (NetBT) improperly handle objects in memory. An attacker who successfully exploited this vulnerability could ob... | 5.5 | MEDIUM | β | 0 |
| CVE-2020-16898 <p>A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could ga... | 8.8 | HIGH | β | 0 |
| CVE-2020-16899 <p>A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could cause ... | 7.5 | HIGH | β | 0 |
| CVE-2020-16900 <p>An elevation of privilege vulnerability exists when the Windows Event System improperly handles objects in memory.</p> <p>To exploit this vulnerability, an attacker would first have to gain executi... | 7.0 | HIGH | β | 0 |
| CVE-2020-16901 <p>An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.</p> <p>To exploit this vulnerability, an authenticated attacker could run a speciall... | 5.0 | MEDIUM | β | 0 |
| CVE-2020-16902 <p>An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.</p> <p>A locally... | 7.8 | HIGH | β | 0 |
| CVE-2020-16904 <p>An elevation of privilege vulnerability exists in the way Azure Functions validate access keys.</p> <p>An unauthenticated attacker who successfully exploited this vulnerability could invoke an HTTP... | 5.3 | MEDIUM | β | 0 |
| CVE-2020-16905 <p>An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successf... | 6.8 | MEDIUM | β | 0 |
| CVE-2020-16907 <p>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability c... | 7.8 | HIGH | β | 0 |
| CVE-2020-16908 <p>An elevation of privilege vulnerability exists in Windows Setup in the way it handles directories.</p> <p>A locally authenticated attacker could run arbitrary code with elevated system privileges. ... | 7.8 | HIGH | β | 0 |
| CVE-2020-16923 <p>A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary... | 7.8 | HIGH | β | 0 |
| CVE-2020-16909 <p>An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successf... | 7.8 | HIGH | β | 0 |
| CVE-2020-16910 <p>A security feature bypass vulnerability exists when Microsoft Windows fails to handle file creation permissions, which could allow an attacker to create files in a protected Unified Extensible Firm... | 6.2 | MEDIUM | β | 0 |
| CVE-2020-16911 <p>A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability cou... | 8.8 | HIGH | β | 0 |
| CVE-2020-16912 <p>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.</p> <p>To exploit this vulnerability, an attacker would first have to gain executi... | 7.8 | HIGH | β | 0 |
| CVE-2023-53232 In the Linux kernel, the following vulnerability has been resolved: mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data The MT7921 driver no longer uses eeprom.data, but the relevant... | 7.1 | HIGH | β | 0 |
| CVE-2020-16913 <p>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability c... | 7.8 | HIGH | β | 0 |
| CVE-2020-16914 <p>An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface Plus (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targe... | 5.5 | MEDIUM | β | 0 |
| CVE-2020-16915 <p>A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, c... | 7.8 | HIGH | β | 0 |
| CVE-2020-16916 <p>An elevation of privilege vulnerability exists when Windows improperly handles COM object creation. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated p... | 7.8 | HIGH | β | 0 |
| CVE-2026-25584 iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a stack-buffer-overflow ... | 7.8 | HIGH | β | 0 |
This product uses data from the NVD API but is not endorsed or certified by the NVD.