Msrc Windows 10 vulnerabilities
3,258 known vulnerabilities affecting msrc/windows_10.
Total CVEs
3,258
CISA KEV
135
actively exploited
Public exploits
194
Exploited in wild
131
Severity breakdown
CRITICAL60HIGH2217MEDIUM954LOW27
Vulnerabilities
Page 81 of 163
CVE-2022-21866HIGHCVSS 7.02022-01-11
CVE-2022-21866 [HIGH] Windows System Launcher Elevation of Privilege Vulnerability
Windows System Launcher Elevation of Privilege Vulnerability
Windows System Launcher: Windows System Launcher
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=K
msrc
CVE-2022-21857HIGHCVSS 8.82022-01-11
CVE-2022-21857 [HIGH] Active Directory Domain Services Elevation of Privilege Vulnerability
Active Directory Domain Services Elevation of Privilege Vulnerability
FAQ: What is the scope of this security update?
This update resolves an elevation of privilege vulnerability specific to Active Directory Domain Services environments with incoming trusts. Prior to this update, an attacker could elevate privileges across the trust boundary under certain conditions.
Windows Active Directory: Windows Ac
msrc
CVE-2022-21835HIGHCVSS 7.82022-01-11
CVE-2022-21835 [HIGH] Microsoft Cryptographic Services Elevation of Privilege Vulnerability
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
Windows Cryptographic Services: Windows Cryptographic Services
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.micro
msrc
CVE-2022-21885HIGHCVSS 7.82022-01-11
CVE-2022-21885 [HIGH] Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely
Ref
msrc
CVE-2022-21916HIGHCVSS 7.82022-01-11
CVE-2022-21916 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely
Reference: http
msrc
CVE-2022-21897HIGHCVSS 7.82022-01-11
CVE-2022-21897 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely
Reference: http
msrc
CVE-2022-21833HIGHCVSS 7.82022-01-11
CVE-2022-21833 [HIGH] Virtual Machine IDE Drive Elevation of Privilege Vulnerability
Virtual Machine IDE Drive Elevation of Privilege Vulnerability
Windows Virtual Machine IDE Drive: Windows Virtual Machine IDE Drive
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com
msrc
CVE-2022-21867HIGHCVSS 7.02022-01-11
CVE-2022-21867 [HIGH] Windows Push Notifications Apps Elevation of Privilege Vulnerability
Windows Push Notifications Apps Elevation of Privilege Vulnerability
Windows Push Notifications: Windows Push Notifications
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v
msrc
CVE-2022-21895HIGHCVSS 7.82022-01-11
CVE-2022-21895 [HIGH] Windows User Profile Service Elevation of Privilege Vulnerability
Windows User Profile Service Elevation of Privilege Vulnerability
Windows User Profile Service: Windows User Profile Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/
msrc
CVE-2022-21880HIGHCVSS 7.52022-01-11
CVE-2022-21880 [HIGH] Windows GDI+ Information Disclosure Vulnerability
Windows GDI+ Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is a pointer leak to the process user-mode address space in the internal memory of the application that is using GDI+.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
msrc
CVE-2022-21922HIGHCVSS 8.82022-01-11
CVE-2022-21922 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability
Remote Procedure Call Runtime Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
The authenticated attacker could take advantage of this vulnerability to execute malicious code through the RPC runtime.
FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
Any authenticated user could trigger this vulnerabilit
msrc
CVE-2022-21851HIGHCVSS 8.82022-01-11
CVE-2022-21851 [HIGH] Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An authenticated user could be tricked into connecting to a malicious remote desktop server where the remote desktop host server sends a specially crafted PDU (Server RDP Preconnection) that targets the remote client's drive redirection virtual channel. The end result could lead to remote code execution o
msrc
CVE-2022-21868HIGHCVSS 7.02022-01-11
CVE-2022-21868 [HIGH] Windows Devices Human Interface Elevation of Privilege Vulnerability
Windows Devices Human Interface Elevation of Privilege Vulnerability
Windows Devices Human Interface: Windows Devices Human Interface
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.micro
msrc
CVE-2022-21908HIGHCVSS 7.82022-01-11
CVE-2022-21908 [HIGH] Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5009557
Reference: htt
msrc
CVE-2022-21836HIGHCVSS 7.82022-01-11
CVE-2022-21836 [HIGH] Windows Certificate Spoofing Vulnerability
Windows Certificate Spoofing Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
A successful attacker could bypass the WPBT binary verification by using a small number of compromised certificates. Microsoft has added those certificates to the Windows kernel driver block list, driver.stl. Certificates on the driver.stl will be blocked even if present in the Windows Plat
msrc
CVE-2022-21914HIGHCVSS 7.82022-01-11
CVE-2022-21914 [HIGH] Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
A local, authenticated attacker could gain elevated privileges through a vulnerable file system component.
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Customer
msrc
CVE-2022-21920HIGHCVSS 8.82022-01-11
CVE-2022-21920 [HIGH] Windows Kerberos Elevation of Privilege Vulnerability
Windows Kerberos Elevation of Privilege Vulnerability
FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain domain administrator privileges.
Windows Kerberos: Windows Kerberos
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited
msrc
CVE-2022-21919HIGHCVSS 7.0KEVPoC2022-01-11
CVE-2022-21919 [HIGH] Windows User Profile Service Elevation of Privilege Vulnerability
Windows User Profile Service Elevation of Privilege Vulnerability
Windows User Profile Service: Windows User Profile Service
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely
Reference: https://catalog.update.microsoft.com/v7
msrc
CVE-2022-21875HIGHCVSS 7.02022-01-11
CVE-2022-21875 [HIGH] Windows Storage Elevation of Privilege Vulnerability
Windows Storage Elevation of Privilege Vulnerability
Windows Storage: Windows Storage
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5009557
Reference: https://sup
msrc
CVE-2022-21893HIGHCVSS 8.02022-01-11
CVE-2022-21893 [HIGH] Remote Desktop Protocol Remote Code Execution Vulnerability
Remote Desktop Protocol Remote Code Execution Vulnerability
FAQ: How would an attacker exploit this vulnerability?
An attacker would have to convince a targeted user to connect to a malicious RDP server. Upon connecting, the malicious server could read or tamper with clipboard contents and the victim's filesystem contents.
Windows RDP: Windows RDP
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Remo
msrc