Msrc Windows 10 vulnerabilities
3,258 known vulnerabilities affecting msrc/windows_10.
Total CVEs
3,258
CISA KEV
135
actively exploited
Public exploits
194
Exploited in wild
131
Severity breakdown
CRITICAL60HIGH2217MEDIUM954LOW27
Vulnerabilities
Page 12 of 163
CVE-2025-47160MEDIUMCVSS 5.42025-06-10
CVE-2025-47160 [MEDIUM] CWE-693 Windows Shortcut Files Security Feature Bypass Vulnerability
Windows Shortcut Files Security Feature Bypass Vulnerability
Description: Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), but could lead to some loss of integrity (I:L) and availability (A:L). What do
msrc
CVE-2025-32715MEDIUMCVSS 6.52025-06-10
CVE-2025-32715 [MEDIUM] CWE-125 Remote Desktop Protocol Client Information Disclosure Vulnerability
Remote Desktop Protocol Client Information Disclosure Vulnerability
Description: Out-of-bounds read in Remote Desktop Client allows an unauthorized attacker to disclose information over a network.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.
FAQ: According t
msrc
CVE-2025-29833HIGHCVSS 7.72025-05-13
CVE-2025-29833 [HIGH] CWE-367 Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
An authorized a
msrc
CVE-2025-29962HIGHCVSS 8.82025-05-13
CVE-2025-29962 [HIGH] CWE-122 Windows Media Remote Code Execution Vulnerability
Windows Media Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could exe
msrc
CVE-2025-24063HIGHCVSS 7.82025-05-13
CVE-2025-24063 [HIGH] CWE-122 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the C
msrc
CVE-2025-32701HIGHCVSS 7.8KEV2025-05-13
CVE-2025-32701 [HIGH] CWE-416 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
msrc
CVE-2025-32706HIGHCVSS 7.8KEV2025-05-13
CVE-2025-32706 [HIGH] CWE-20 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM pri
msrc
CVE-2025-30385HIGHCVSS 7.82025-05-13
CVE-2025-30385 [HIGH] CWE-416 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could potentially gain the abili
msrc
CVE-2025-32709HIGHCVSS 7.8KEV2025-05-13
CVE-2025-32709 [HIGH] CWE-416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerabilit
msrc
CVE-2025-30397HIGHCVSS 7.5KEVPoC2025-05-13
CVE-2025-30397 [HIGH] CWE-843 Scripting Engine Memory Corruption Vulnerability
Scripting Engine Memory Corruption Vulnerability
Description: Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to first prepare
msrc
CVE-2025-29840HIGHCVSS 8.82025-05-13
CVE-2025-29840 [HIGH] CWE-121 Windows Media Remote Code Execution Vulnerability
Windows Media Remote Code Execution Vulnerability
Description: Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires a user to open a specially crafted file from the attacke
msrc
CVE-2025-29966HIGHCVSS 8.82025-05-13
CVE-2025-29966 [HIGH] CWE-122 Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine w
msrc
CVE-2025-27468HIGHCVSS 7.02025-05-13
CVE-2025-27468 [HIGH] CWE-269 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Description: Improper privilege management in Windows Secure Kernel Mode allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race conditio
msrc
CVE-2025-30388HIGHCVSS 7.82025-05-13
CVE-2025-30388 [HIGH] CWE-122 Windows Graphics Component Remote Code Execution Vulnerability
Windows Graphics Component Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type o
msrc
CVE-2025-29967HIGHCVSS 8.82025-05-13
CVE-2025-29967 [HIGH] CWE-122 Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client m
msrc
CVE-2025-29969HIGHCVSS 7.52025-05-13
CVE-2025-29969 [HIGH] CWE-367 MS-EVEN RPC Remote Code Execution Vulnerability
MS-EVEN RPC Remote Code Execution Vulnerability
Description: Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: Accordin
msrc
CVE-2025-29842HIGHCVSS 7.52025-05-13
CVE-2025-29842 [HIGH] CWE-349 UrlMon Security Feature Bypass Vulnerability
UrlMon Security Feature Bypass Vulnerability
Description: Acceptance of extraneous untrusted data with trusted data in UrlMon allows an unauthorized attacker to bypass a security feature over a network.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
The user would have to click on a specially crafted URL to be compromised by the attacker.
FAQ: What ki
msrc
CVE-2025-29974MEDIUMCVSS 5.72025-05-13
CVE-2025-29974 [MEDIUM] CWE-191 Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Description: Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network.
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory content.
FAQ: According to the CVSS metric, user intera
msrc
CVE-2025-29960MEDIUMCVSS 6.52025-05-13
CVE-2025-29960 [MEDIUM] CWE-125 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Description: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could po
msrc
CVE-2025-29829MEDIUMCVSS 5.52025-05-13
CVE-2025-29829 [MEDIUM] CWE-908 Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability
Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability
Description: Use of uninitialized resource in Windows Trusted Runtime Interface Driver allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain kernel memory conten
msrc