Msrc Windows 10 For 32-Bit Systems vulnerabilities

188 known vulnerabilities affecting msrc/windows_10_for_32-bit_systems.

Total CVEs
188
CISA KEV
5
actively exploited
Public exploits
31
Exploited in wild
5
Severity breakdown
CRITICAL7HIGH89MEDIUM83LOW9

Vulnerabilities

Page 3 of 10
CVE-2019-1082HIGHCVSS 7.72019-07-09
CVE-2019-1082 [HIGH] Microsoft Windows Elevation of Privilege Vulnerability Microsoft Windows Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Microsoft Windows where a certain DLL, with Local Service privilege, is vulnerable to race planting a customized DLL. An attacker who successfully exploited this vulnerability could potentially elevate privilege to SYSTEM. The update addresses this vulnerability by requiring SYSTEM privileges for a certa
msrc
CVE-2019-0999HIGHCVSS 7.82019-07-09
CVE-2019-0999 [HIGH] DirectX Elevation of Privilege Vulnerability DirectX Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have t
msrc
CVE-2019-1045HIGHCVSS 7.82019-06-11
CVE-2019-1045 [HIGH] Windows Network File System Elevation of Privilege Vulnerability Windows Network File System Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows Network File System (NFS) handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application
msrc
CVE-2019-1018HIGHCVSS 7.02019-06-11
CVE-2019-1018 [HIGH] DirectX Elevation of Privilege Vulnerability DirectX Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have t
msrc
CVE-2019-0942MEDIUMCVSS 4.42019-05-14
CVE-2019-0942 [MEDIUM] Unified Write Filter Elevation of Privilege Vulnerability Unified Write Filter Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the Unified Write Filter (UWF) feature for Windows 10 when it improperly restricts access to the registry. An attacker who successfully exploited the vulnerability could make changes to the registry keys protected by UWF without having administrator privileges. To exploit the vulnerability, an at
msrc
CVE-2018-8471HIGHCVSS 7.02018-11-13
CVE-2018-8471 [HIGH] Microsoft RemoteFX Virtual GPU miniport driver Elevation of Privilege Vulnerability Microsoft RemoteFX Virtual GPU miniport driver Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Microsoft RemoteFX Virtual GPU miniport driver handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated
msrc
CVE-2018-8493MEDIUMCVSS 5.92018-10-09
CVE-2018-8493 [HIGH] Windows TCP/IP Information Disclosure Vulnerability Windows TCP/IP Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles fragmented IP packets. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to send specially crafted fragmented IP packets to a remote Wind
msrc
CVE-2018-8444HIGHCVSS 7.02018-09-11
CVE-2018-8444 [MEDIUM] Windows SMB Information Disclosure Vulnerability Windows SMB Information Disclosure Vulnerability Description: An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests. An attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. To exploit the vulnerability, in most situations, an unauthenticated attac
msrc
CVE-2018-8462HIGHCVSS 7.02018-09-11
CVE-2018-8462 [HIGH] DirectX Graphics Kernel Elevation of Privilege Vulnerability DirectX Graphics Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a special
msrc
CVE-2018-8438MEDIUMCVSS 5.82018-09-11
CVE-2018-8438 [MEDIUM] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability Description: A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest o
msrc
CVE-2018-8449MEDIUMCVSS 5.3PoC2018-09-11
CVE-2018-8449 [LOW] Device Guard Security Feature Bypass Vulnerability Device Guard Security Feature Bypass Vulnerability Description: A security feature bypass exists when Device Guard incorrectly validates an untrusted file. An attacker who successfully exploited this vulnerability could make an unsigned file appear to be signed. Because Device Guard relies on the signature to determine the file is non-malicious, Device Guard could then allow a malicious file to execute. In an attack scenario
msrc
CVE-2018-8405HIGHCVSS 7.0KEV2018-08-14
CVE-2018-8405 [HIGH] DirectX Graphics Kernel Elevation of Privilege Vulnerability DirectX Graphics Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a special
msrc
CVE-2018-8401HIGHCVSS 7.02018-08-14
CVE-2018-8401 [HIGH] DirectX Graphics Kernel Elevation of Privilege Vulnerability DirectX Graphics Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a special
msrc
CVE-2018-8406HIGHCVSS 7.0KEV2018-08-14
CVE-2018-8406 [HIGH] DirectX Graphics Kernel Elevation of Privilege Vulnerability DirectX Graphics Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a special
msrc
CVE-2018-8200MEDIUMCVSS 5.32018-08-14
CVE-2018-8200 [MEDIUM] Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the
msrc
CVE-2018-8204MEDIUMCVSS 5.32018-08-14
CVE-2018-8204 [MEDIUM] Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the
msrc
CVE-2018-0952MEDIUMCVSS 6.7PoC2018-08-14
CVE-2018-0952 [HIGH] Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that
msrc
CVE-2018-8314MEDIUMCVSS 4.32018-07-10
CVE-2018-8314 [MEDIUM] Windows Elevation of Privilege Vulnerability Windows Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Windows fails a check, allowing a sandbox escape. An attacker who successfully exploited the vulnerability could use the sandbox escape to elevate privileges on an affected system. This vulnerability by itself does not allow arbitrary code execution. However, the vulnerability could allow arbitrary code to run if an att
msrc
CVE-2018-8222MEDIUMCVSS 5.32018-07-10
CVE-2018-8222 [MEDIUM] Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the
msrc
CVE-2018-8213HIGHCVSS 7.82018-06-12
CVE-2018-8213 [HIGH] Windows Remote Code Execution Vulnerability Windows Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited this vulnerability could take control of an affected system. To exploit the vulnerability, an attacker would first have to log on to the target system and then run a specially crafted application. The updates address the vulnerability by corr
msrc
Msrc Windows 10 For 32-Bit Systems vulnerabilities | cvebase