7.8
CVSSv3

CVE-2020-0791

Published: 12/03/2020 Updated: 21/07/2021
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0898.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 -

microsoft windows 10 1607

microsoft windows 10 1709

microsoft windows 10 1803

microsoft windows 10 1809

microsoft windows 10 1903

microsoft windows 10 1909

microsoft windows 7 -

microsoft windows 8.1 -

microsoft windows rt 8.1 -

microsoft windows server 2008 -

microsoft windows server 2008 r2

microsoft windows server 2012 -

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows server 2016 1803

microsoft windows server 2016 1903

microsoft windows server 2016 1909

microsoft windows server 2019 -

Github Repositories

M365D_table

Microsoft Defender 365 Advanced hunting full schema reference (Streaming API overview) MS 365 Advanced hunting schema tables reference MS 365 Defender/Azure Sentinel detections/custom KQL querries Table Schema: Acronym Product MS365D Microsoft 365 Defender MDI Microsoft Defender for Identity MDE Microsoft Defender for Endpoint MDA Microsoft Defender for Cloud Apps

Recent Articles

Microsoft Patch Tuesday – March 2020
Symantec Threat Intelligence Blog • Preethi Koroth • 11 Mar 2024

This month the vendor has patched 115 vulnerabilities, 25 of which are rated Critical.

Posted: 11 Mar, 202028 Min ReadThreat Intelligence SubscribeMicrosoft Patch Tuesday – March 2020This month the vendor has patched 115 vulnerabilities, 25 of which are rated Critical.As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionality. Avoid handling files from unknown or questionabl...