Логотип exploitDog
bind:CVE-2020-16891
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-16891

Количество 4

Количество 4

nvd логотип

CVE-2020-16891

больше 4 лет назад

<p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.</p> <p>An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.</p> <p>The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.</p>

CVSS3: 8.8
EPSS: Низкий
msrc логотип

CVE-2020-16891

больше 4 лет назад

Windows Hyper-V Remote Code Execution Vulnerability

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-fj3r-5xm4-3r4m

около 3 лет назад

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2020-04708

больше 4 лет назад

Уязвимость системы аппаратной виртуализации Hyper-V операционной системы Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-16891

<p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.</p> <p>An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.</p> <p>The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.</p>

CVSS3: 8.8
1%
Низкий
больше 4 лет назад
msrc логотип
CVE-2020-16891

Windows Hyper-V Remote Code Execution Vulnerability

CVSS3: 8.8
1%
Низкий
больше 4 лет назад
github логотип
GHSA-fj3r-5xm4-3r4m

A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'.

CVSS3: 8.8
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-04708

Уязвимость системы аппаратной виртуализации Hyper-V операционной системы Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
1%
Низкий
больше 4 лет назад

Уязвимостей на страницу