Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.2061 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.2061 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:* | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:* | |
| Microsoft | Windows Server, version 1903 (Server Core installation) | 10.0.0 ~ publication | cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.1110 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ 10.0.14393.4530 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ 10.0.14393.4530 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4530:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21167 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) | 6.0.0 ~ 6.0.6003.21167 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21167 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21167:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ 6.1.7601.25661 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ 6.1.7601.25661 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25661:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23409 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23409 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23409:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20069 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20069 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20069:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19041.1110 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19041.1110:*:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2020-17051 | 9.8 CRITICAL | Windows Network File System Remote Code Execution Vulnerability |
| CVE-2020-17061 | 8.8 HIGH | Microsoft SharePoint Remote Code Execution Vulnerability |
| CVE-2020-17042 | 8.8 HIGH | Windows Print Spooler Remote Code Execution Vulnerability |
| CVE-2020-17084 | 8.5 HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2020-16970 | 8.1 HIGH | Azure Sphere Unsigned Code Execution Vulnerability |
| CVE-2020-17016 | 8.0 HIGH | Microsoft SharePoint Server Spoofing Vulnerability |
| CVE-2020-17067 | 7.8 HIGH | Microsoft Excel Security Feature Bypass Vulnerability |
| CVE-2020-17043 | 7.8 HIGH | Windows Remote Access Elevation of Privilege Vulnerability |
| CVE-2020-17068 | 7.8 HIGH | Windows GDI+ Remote Code Execution Vulnerability |
| CVE-2020-17064 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2020-17065 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2020-17062 | 7.8 HIGH | Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability |
| CVE-2020-17055 | 7.8 HIGH | Windows Remote Access Elevation of Privilege Vulnerability |
| CVE-2020-17044 | 7.8 HIGH | Windows Remote Access Elevation of Privilege Vulnerability |
| CVE-2020-17041 | 7.8 HIGH | Windows Print Configuration Elevation of Privilege Vulnerability |
| CVE-2020-17037 | 7.8 HIGH | Windows WalletService Elevation of Privilege Vulnerability |
| CVE-2020-17038 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2020-17035 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2020-17019 | 7.8 HIGH | Microsoft Excel Remote Code Execution Vulnerability |
| CVE-2020-17014 | 7.8 HIGH | Windows Print Spooler Elevation of Privilege Vulnerability |
Showing top 20 of 112 CVEs. View all on vendor page → →
No comments yet