Microsoft Windows 10 Version 1909 vulnerabilities
967 known vulnerabilities affecting microsoft/windows_10_version_1909.
Total CVEs
967
CISA KEV
33
actively exploited
Public exploits
13
Exploited in wild
40
Severity breakdown
CRITICAL31HIGH719MEDIUM214LOW3
Vulnerabilities
Page 43 of 49
CVE-2020-0886HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-0886 [HIGH] CVE-2020-0886: <p>An elevation of privilege vulnerability exists when the Windows Storage Services improperly handl
An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.
To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.
The
nvd
CVE-2020-1169HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1169 [HIGH] CVE-2020-1169: <p>An elevation of privilege vulnerability exists when the Windows Runtime improperly handles object
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnerabili
nvd
CVE-2020-1030HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1030 [HIGH] CVE-2020-1030: <p>An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full us
nvd
CVE-2020-1130HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1130 [HIGH] CVE-2020-1130: <p>An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improp
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles data operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the
nvd
CVE-2020-1074HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1074 [HIGH] CVE-2020-1074: <p>A remote code execution vulnerability exists when the Windows Jet Database Engine improperly hand
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the vulnerabili
nvd
CVE-2020-1152HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1152 [HIGH] CVE-2020-1152: <p>An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sy
An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system.
To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.
The update addres
nvd
CVE-2020-1471HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1471 [HIGH] CVE-2020-1471: <p>An elevation of privilege vulnerability exists when Microsoft Windows CloudExperienceHost fails t
An elevation of privilege vulnerability exists when Microsoft Windows CloudExperienceHost fails to check COM objects. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system.
To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.
nvd
CVE-2020-0648HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-0648 [HIGH] CVE-2020-0648: <p>An elevation of privilege vulnerability exists when the Windows RSoP Service Application improper
An elevation of privilege vulnerability exists when the Windows RSoP Service Application improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how
nvd
CVE-2020-1159HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1159 [HIGH] CVE-2020-1159: <p>An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles file
An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles file creation in protected locations. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update add
nvd
CVE-2020-1532HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1532 [HIGH] CVE-2020-1532: <p>An elevation of privilege vulnerability exists when the Windows InstallService improperly handles
An elevation of privilege vulnerability exists when the Windows InstallService improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how the Windo
nvd
CVE-2020-0908HIGHCVSS 7.5≥ 10.0.0, < publication2020-09-11
CVE-2020-0908 [HIGH] CVE-2020-0908: <p>A remote code execution vulnerability exists when the Windows Text Service Module improperly hand
A remote code execution vulnerability exists when the Windows Text Service Module improperly handles memory. An attacker who successfully exploited the vulnerability could gain execution on a victim system.
An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge (Chromium-based), and then convince
nvd
CVE-2020-1319HIGHCVSS 7.8vN/A2020-09-11
CVE-2020-1319 [HIGH] CVE-2020-1319: <p>A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library han
A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Exploitation of the vuln
nvd
CVE-2020-1303HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1303 [HIGH] CVE-2020-1303: <p>An elevation of privilege vulnerability exists when the Windows Runtime improperly handles object
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnerabili
nvd
CVE-2020-0839HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-0839 [HIGH] CVE-2020-0839: <p>An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects i
An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerability
nvd
CVE-2020-0782HIGHCVSS 7.8≥ 10.0.0, < publication2020-09-11
CVE-2020-0782 [HIGH] CVE-2020-0782: <p>An elevation of privilege vulnerability exists when the Windows Cryptographic Catalog Services im
An elevation of privilege vulnerability exists when the Windows Cryptographic Catalog Services improperly handle objects in memory. An attacker who successfully exploited this vulnerability could modify the cryptographic catalog.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted a
nvd
CVE-2020-1508HIGHCVSS 8.8≥ 10.0.0, < publication2020-09-11
CVE-2020-1508 [HIGH] CVE-2020-1508: <p>A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles
A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user
nvd
CVE-2020-1097MEDIUMCVSS 6.5≥ 10.0.0, < publication2020-09-11
CVE-2020-1097 [MEDIUM] CVE-2020-1097: <p>An information disclosure vulnerability exists when the Windows GDI component improperly disclose
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a speci
nvd
CVE-2020-0928MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-09-11
CVE-2020-0928 [MEDIUM] CVE-2020-0928: <p>An information disclosure vulnerability exists when the Windows kernel improperly handles objects
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. T
nvd
CVE-2020-1596MEDIUMCVSS 5.3≥ 10.0.0, < publication2020-09-11
CVE-2020-1596 [MEDIUM] CWE-327 CVE-2020-1596: <p>A information disclosure vulnerability exists when TLS components use weak hash algorithms. An at
A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise a users's encrypted transmission channel.
To exploit the vulnerability, an attacker would have to conduct a man-in-the-middle attack.
The update addresses t
nvd
CVE-2020-1589MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-09-11
CVE-2020-1589 [MEDIUM] CVE-2020-1589: <p>An information disclosure vulnerability exists when the Windows kernel improperly handles objects
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. T
nvd