Microsoft Windows 10 Version 1709 vulnerabilities

270 known vulnerabilities affecting microsoft/windows_10_version_1709.

Total CVEs
270
CISA KEV
3
actively exploited
Public exploits
12
Exploited in wild
4
Severity breakdown
CRITICAL4HIGH201MEDIUM65

Vulnerabilities

Page 3 of 14
CVE-2020-16914MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-10-16
CVE-2020-16914 [MEDIUM] CVE-2020-16914: <p>An information disclosure vulnerability exists in the way that the Windows Graphics Device Interf An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface Plus (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses i
cvelistv5nvd
CVE-2020-16910MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-10-16
CVE-2020-16910 [MEDIUM] CWE-281 CVE-2020-16910: <p>A security feature bypass vulnerability exists when Microsoft Windows fails to handle file creati A security feature bypass vulnerability exists when Microsoft Windows fails to handle file creation permissions, which could allow an attacker to create files in a protected Unified Extensible Firmware Interface (UEFI) location. To exploit this vulnerability, an attacker could run a specially crafted application to bypass Unified Extensible Firmware
cvelistv5nvd
CVE-2020-16919MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-10-16
CVE-2020-16919 [MEDIUM] CVE-2020-16919: <p>An information disclosure vulnerability exists when the Windows Enterprise App Management Service An information disclosure vulnerability exists when the Windows Enterprise App Management Service improperly handles certain file operations. An attacker who successfully exploited this vulnerability could read arbitrary files. An attacker with unprivileged access to a vulnerable system could exploit this vulnerability. The security update addresses the vul
cvelistv5nvd
CVE-2020-16940MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-10-16
CVE-2020-16940 [MEDIUM] CWE-269 CVE-2020-16940: <p>An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) im An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles junction points. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then
cvelistv5nvd
CVE-2020-16889MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-10-16
CVE-2020-16889 [MEDIUM] CVE-2020-16889: <p>An information disclosure vulnerability exists when the Windows KernelStream improperly handles o An information disclosure vulnerability exists when the Windows KernelStream improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted applic
cvelistv5nvd
CVE-2020-16921MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-10-16
CVE-2020-16921 [MEDIUM] CVE-2020-16921: <p>An information disclosure vulnerability exists in Text Services Framework when it fails to proper An information disclosure vulnerability exists in Text Services Framework when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights dir
cvelistv5nvd
CVE-2020-0766HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-0766 [HIGH] CVE-2020-0766: <p>An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handle An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Micr
cvelistv5nvd
CVE-2020-1285HIGHCVSS 8.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1285 [HIGH] CVE-2020-1285: <p>A remote code execution vulnerability exists in the way that the Windows Graphics Device Interfac A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users who
cvelistv5nvd
CVE-2020-1593HIGHCVSS 8.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1593 [HIGH] CVE-2020-1593: <p>A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user
cvelistv5nvd
CVE-2020-0839HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-0839 [HIGH] CVE-2020-0839: <p>An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects i An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability
cvelistv5nvd
CVE-2020-1559HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1559 [HIGH] CVE-2020-1559: <p>An elevation of privilege vulnerability exists when the Windows Storage Services improperly handl An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The
cvelistv5nvd
CVE-2020-0870HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-0870 [HIGH] CVE-2020-0870: <p>An elevation of privilege vulnerability exists when the Shell infrastructure component improperly An elevation of privilege vulnerability exists when the Shell infrastructure component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted appl
cvelistv5nvd
CVE-2020-1129HIGHCVSS 8.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1129 [HIGH] CVE-2020-1129: <p>A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library han A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of the vuln
cvelistv5nvd
CVE-2020-0922HIGHCVSS 8.8≥ 10.0.0, < publication2020-09-11
CVE-2020-0922 [HIGH] CVE-2020-0922: <p>A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles ob A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript.
cvelistv5nvd
CVE-2020-1252HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1252 [HIGH] CVE-2020-1252: <p>A remote code execution vulnerability exists when Windows improperly handles objects in memory. T A remote code execution vulnerability exists when Windows improperly handles objects in memory. To exploit the vulnerability an attacker would have to convince a user to run a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then instal
cvelistv5nvd
CVE-2020-1053HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1053 [HIGH] CVE-2020-1053: <p>An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would
cvelistv5nvd
CVE-2020-0911HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-0911 [HIGH] CVE-2020-0911: <p>An elevation of privilege vulnerability exists when Windows Modules Installer improperly handles An elevation of privilege vulnerability exists when Windows Modules Installer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulner
cvelistv5nvd
CVE-2020-1034HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1034 [HIGH] CVE-2020-1034: <p>An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerabili
cvelistv5nvd
CVE-2020-1133HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1133 [HIGH] CVE-2020-1133: <p>An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improp An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the
cvelistv5nvd
CVE-2020-0908HIGHCVSS 7.5≥ 10.0.0, < publication2020-09-11
CVE-2020-0908 [HIGH] CVE-2020-0908: <p>A remote code execution vulnerability exists when the Windows Text Service Module improperly hand A remote code execution vulnerability exists when the Windows Text Service Module improperly handles memory. An attacker who successfully exploited the vulnerability could gain execution on a victim system. An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge (Chromium-based), and then convince
cvelistv5nvd