Логотип exploitDog
bind:CVE-2019-0720
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-0720

Количество 4

Количество 4

nvd логотип

CVE-2019-0720

почти 6 лет назад

A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Windows Hyper-V Network Switch validates guest operating system network traffic.

CVSS3: 8
EPSS: Низкий
msrc логотип

CVE-2019-0720

почти 6 лет назад

Hyper-V Remote Code Execution Vulnerability

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-g8mh-95ff-hf7w

около 3 лет назад

A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V Remote Code Execution Vulnerability'.

CVSS3: 8.4
EPSS: Низкий
fstec логотип

BDU:2019-02948

почти 6 лет назад

Уязвимость системы аппаратной виртуализации Hyper-V операционной системы Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-0720

A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Windows Hyper-V Network Switch validates guest operating system network traffic.

CVSS3: 8
1%
Низкий
почти 6 лет назад
msrc логотип
CVE-2019-0720

Hyper-V Remote Code Execution Vulnerability

CVSS3: 8
1%
Низкий
почти 6 лет назад
github логотип
GHSA-g8mh-95ff-hf7w

A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Hyper-V Remote Code Execution Vulnerability'.

CVSS3: 8.4
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-02948

Уязвимость системы аппаратной виртуализации Hyper-V операционной системы Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 8
1%
Низкий
почти 6 лет назад

Уязвимостей на страницу