Msrc Windows 10 vulnerabilities
3,258 known vulnerabilities affecting msrc/windows_10.
Total CVEs
3,258
CISA KEV
135
actively exploited
Public exploits
194
Exploited in wild
131
Severity breakdown
CRITICAL60HIGH2217MEDIUM954LOW27
Vulnerabilities
Page 20 of 163
CVE-2025-21300HIGHCVSS 7.52025-01-14
CVE-2025-21300 [HIGH] CWE-400 Windows Universal Plug and Play (UPnP) Device Host Denial of Service Vulnerability
Windows Universal Plug and Play (UPnP) Device Host Denial of Service Vulnerability
Windows Universal Plug and Play (UPnP) Device Host: Windows Universal Plug and Play (UPnP) Device Host
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https:/
msrc
CVE-2025-21243HIGHCVSS 8.82025-01-14
CVE-2025-21243 [HIGH] CWE-190 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21303HIGHCVSS 8.82025-01-14
CVE-2025-21303 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21290HIGHCVSS 7.52025-01-14
CVE-2025-21290 [HIGH] CWE-400 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (DoS).
Windows Message Queuing: Window
msrc
CVE-2025-21295HIGHCVSS 8.12025-01-14
CVE-2025-21295 [HIGH] CWE-416 SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to manipulate system operations in a specific manner.
FAQ: How could an attacker exploit the vulnera
msrc
CVE-2025-21273HIGHCVSS 8.82025-01-14
CVE-2025-21273 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21276HIGHCVSS 7.52025-01-14
CVE-2025-21276 [HIGH] CWE-191 Windows MapUrlToZone Denial of Service Vulnerability
Windows MapUrlToZone Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (DoS).
FAQ: The Security Updates table indicates that this vul
msrc
CVE-2025-21411HIGHCVSS 8.82025-01-14
CVE-2025-21411 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21248HIGHCVSS 8.82025-01-14
CVE-2025-21248 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21270HIGHCVSS 7.52025-01-14
CVE-2025-21270 [HIGH] CWE-400 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (DoS).
Windows Message Queuing: Window
msrc
CVE-2025-21231HIGHCVSS 7.52025-01-14
CVE-2025-21231 [HIGH] CWE-400 IP Helper Denial of Service Vulnerability
IP Helper Denial of Service Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N). How could an attacker exploit this vulnerability?
As an authenticated user, the attacker could send a specially crafted string of data over the network, causing the application to crash.
IP Helper: IP Helper
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicl
msrc
CVE-2025-21306HIGHCVSS 8.82025-01-14
CVE-2025-21306 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21230HIGHCVSS 7.52025-01-14
CVE-2025-21230 [HIGH] CWE-20 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of availability (A:H). What does that mean for this vulnerability?
An attacker can send specially crafted packets which could affect availability of the service and result in Denial of Service (DoS).
Windows Message Queuing: Windows
msrc
CVE-2025-21296HIGHCVSS 7.52025-01-14
CVE-2025-21296 [HIGH] CWE-416 BranchCache Remote Code Execution Vulnerability
BranchCache Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
FAQ: According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?
This attack is limited to systems connected to
msrc
CVE-2025-21241HIGHCVSS 8.82025-01-14
CVE-2025-21241 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21305HIGHCVSS 8.82025-01-14
CVE-2025-21305 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21240HIGHCVSS 8.82025-01-14
CVE-2025-21240 [HIGH] CWE-122 Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Windows Telephony Service: Windows Telephony Service
Micr
msrc
CVE-2025-21323MEDIUMCVSS 5.52025-01-14
CVE-2025-21323 [MEDIUM] CWE-532 Windows Kernel Memory Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.
Windows Kernel Memory: Windows Kernel Memory
Micr
msrc
CVE-2025-21336MEDIUMCVSS 5.62025-01-14
CVE-2025-21336 [MEDIUM] CWE-203 Windows Cryptographic Information Disclosure Vulnerability
Windows Cryptographic Information Disclosure Vulnerability
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to carefully time their actions to exploit the timing differences in the execution of specific operations. They must accurately measure these timing variations to in
msrc
CVE-2025-21278MEDIUMCVSS 6.22025-01-14
CVE-2025-21278 [MEDIUM] CWE-362 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Windows Remote Desktop Services: Windows Remote Desktop Services
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?
msrc