Msrc Windows 10 vulnerabilities
3,258 known vulnerabilities affecting msrc/windows_10.
Total CVEs
3,258
CISA KEV
135
actively exploited
Public exploits
194
Exploited in wild
131
Severity breakdown
CRITICAL60HIGH2217MEDIUM954LOW27
Vulnerabilities
Page 29 of 163
CVE-2024-38107HIGHCVSS 7.8KEV2024-08-13
CVE-2024-38107 [HIGH] CWE-416 Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Securit
msrc
CVE-2024-38153HIGHCVSS 7.82024-08-13
CVE-2024-38153 [HIGH] CWE-367 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?
The new Copilot+ devices th
msrc
CVE-2024-38117HIGHCVSS 7.82024-08-13
CVE-2024-38117 [HIGH] CWE-125 NTFS Elevation of Privilege Vulnerability
NTFS Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, privileges required is Low (PR:L). What does that mean for this vulnerability?
To exploit this vulnerability an attacker must have an account with the User role a
msrc
CVE-2024-38144HIGHCVSS 8.82024-08-13
CVE-2024-38144 [HIGH] CWE-190 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in t
msrc
CVE-2024-38131HIGHCVSS 8.82024-08-13
CVE-2024-38131 [HIGH] CWE-591 Clipboard Virtual Channel Extension Remote Code Execution Vulnerability
Clipboard Virtual Channel Extension Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
FAQ: According to the CVSS metric, the
msrc
CVE-2024-38191HIGHCVSS 7.82024-08-13
CVE-2024-38191 [HIGH] CWE-362 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel-Mode Drivers: Windows Kernel-Mode Drivers
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
msrc
CVE-2024-38130HIGHCVSS 8.82024-08-13
CVE-2024-38130 [HIGH] CWE-122 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires a client to connect to a malicious server, and th
msrc
CVE-2024-38180HIGHCVSS 8.82024-08-13
CVE-2024-38180 [HIGH] CWE-693 Windows SmartScreen Security Feature Bypass Vulnerability
Windows SmartScreen Security Feature Bypass Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
A user needs to be tricked into running malicious files.
FAQ: How could an attacker exploit this vulnerability?
To exploit this security feature bypass vulnerability, an attacker would need to convince a user to launch malicious files u
msrc
CVE-2024-38193HIGHCVSS 7.8KEVPoC2024-08-13
CVE-2024-38193 [HIGH] CWE-416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows lis
msrc
CVE-2024-38141HIGHCVSS 7.82024-08-13
CVE-2024-38141 [HIGH] CWE-416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows lis
msrc
CVE-2024-38132HIGHCVSS 7.52024-08-13
CVE-2024-38132 [HIGH] CWE-125 Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows Network Address Translation (NAT) Denial of Service Vulnerability
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?
The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities
msrc
CVE-2024-38178HIGHCVSS 7.5KEV2024-08-13
CVE-2024-38178 [HIGH] CWE-843 Scripting Engine Memory Corruption Vulnerability
Scripting Engine Memory Corruption Vulnerability
FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?
This attack requires an authenticated client to click a link so that an unauthenticated attacker can initiate remote code execution.
FAQ: According to the CVSS metric, the attack complexity is high
msrc
CVE-2024-29995HIGHCVSS 8.12024-08-13
CVE-2024-29995 [HIGH] CWE-208 Windows Kerberos Elevation of Privilege Vulnerability
Windows Kerberos Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
The attacker must inject themselves into the logical net
msrc
CVE-2024-38145HIGHCVSS 7.52024-08-13
CVE-2024-38145 [HIGH] CWE-476 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?
The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that aff
msrc
CVE-2022-3775HIGHCVSS 7.12024-08-13
CVE-2022-3775 [HIGH] CWE-122 Redhat: CVE-2022-3775 grub2 - Heap based out-of-bounds write when rendering certain Unicode sequences
Redhat: CVE-2022-3775 grub2 - Heap based out-of-bounds write when rendering certain Unicode sequences
NIST NVD Details: https://nvd.nist.gov/vuln/detail/CVE-2022-3775
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?
The new Copilot+ devices that are now publicly ava
msrc
CVE-2024-38196HIGHCVSS 7.82024-08-13
CVE-2024-38196 [HIGH] CWE-20 Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Securi
msrc
CVE-2024-38151MEDIUMCVSS 5.52024-08-13
CVE-2024-38151 [MEDIUM] CWE-125 Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is a small amount of kernel memory which could be leaked back to the attacker.
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Wi
msrc
CVE-2024-38122MEDIUMCVSS 5.52024-08-13
CVE-2024-38122 [MEDIUM] CWE-908 Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker who successfully exploited this vulnerability could potentially read small portions of stack memory.
FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows
msrc
CVE-2024-21302MEDIUMCVSS 6.72024-08-13
CVE-2024-21302 [MEDIUM] CWE-284 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Description: Summary:
As of July 10, 2025 Microsoft has completed mitigations to address this vulnerability. See KB5042562: Guidance for blocking rollback of virtualization-based security related updates and the Recommended Actions section of this CVE for guidance on how to protect your systems from this vulnerability.
An elevation of pr
msrc
CVE-2024-38223MEDIUMCVSS 6.82024-08-13
CVE-2024-38223 [MEDIUM] CWE-284 Windows Initial Machine Configuration Elevation of Privilege Vulnerability
Windows Initial Machine Configuration Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?
To exploit this vulnerability, an attacker needs physical access to the victim's machine.
FAQ: How could an attacker exploit this vulnerability?
An unauthenticated attacker can use a specially crafte
msrc