Microsoft Windows 10 Version 1909 vulnerabilities

967 known vulnerabilities affecting microsoft/windows_10_version_1909.

Total CVEs
967
CISA KEV
33
actively exploited
Public exploits
13
Exploited in wild
40
Severity breakdown
CRITICAL31HIGH719MEDIUM214LOW3

Vulnerabilities

Page 49 of 49
CVE-2020-1510MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-08-17
CVE-2020-1510 [MEDIUM] CWE-200 CVE-2020-1510: An information disclosure vulnerability exists when the win32k component improperly provides kernel An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted appl
nvd
CVE-2020-1548MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-08-17
CVE-2020-1548 [MEDIUM] CVE-2020-1548: An information disclosure vulnerability exists when the Windows WaasMedic Service improperly handles An information disclosure vulnerability exists when the Windows WaasMedic Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to improperly disclose memory. The security update addresses the vulnerability by correcting
nvd
CVE-2020-1578MEDIUMCVSS 4.7≥ 10.0.0, < publication2020-08-17
CVE-2020-1578 [MEDIUM] CVE-2020-1578: An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object. To exploit the vulnerability, an attacker would ha
nvd
CVE-2020-1459MEDIUMCVSS 5.5≥ 10.0.0, < publication2020-08-17
CVE-2020-1459 [MEDIUM] CWE-203 CVE-2020-1459: An information disclosure vulnerability exists on ARM implementations that use speculative execution An information disclosure vulnerability exists on ARM implementations that use speculative execution in control flow via a side-channel analysis, aka "straight-line speculation." To exploit this vulnerability, an attacker with local privileges would need to run a specially crafted application. The security update addresses the vulnerability by bypassi
nvd
CVE-2019-1226CRITICALCVSS 9.8≥ 10.0.0, < publication2019-08-14
CVE-2019-1226 [CRITICAL] CVE-2019-1226: A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability cou
nvd
CVE-2019-1225HIGHCVSS 7.5Exploited≥ 10.0.0, < publication2019-08-14
CVE-2019-1225 [HIGH] CWE-200 CVE-2019-1225: An information disclosure vulnerability exists when the Windows RDP server improperly discloses the An information disclosure vulnerability exists when the Windows RDP server improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system. To exploit this vulnerability, an attacker would have to connect remotely to an affected system and run a specially
nvd
CVE-2019-1224HIGHCVSS 7.5Exploited≥ 10.0.0, < publication2019-08-14
CVE-2019-1224 [HIGH] CWE-200 CVE-2019-1224: An information disclosure vulnerability exists when the Windows RDP server improperly discloses the An information disclosure vulnerability exists when the Windows RDP server improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system. To exploit this vulnerability, an attacker would have to connect remotely to an affected system and run a specially
nvd