Msrc Windows 10 For 32-Bit Systems vulnerabilities

188 known vulnerabilities affecting msrc/windows_10_for_32-bit_systems.

Total CVEs
188
CISA KEV
5
actively exploited
Public exploits
31
Exploited in wild
5
Severity breakdown
CRITICAL7HIGH89MEDIUM83LOW9

Vulnerabilities

Page 6 of 10
CVE-2017-8715MEDIUMCVSS 5.32017-10-10
CVE-2017-8715 [MEDIUM] Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the
msrc
CVE-2017-8693MEDIUMCVSS 5.52017-10-10
CVE-2017-8693 [MEDIUM] Microsoft Graphics Component Information Disclosure Vulnerability Microsoft Graphics Component Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affecte
msrc
CVE-2017-11769MEDIUMCVSS 4.22017-10-10
CVE-2017-11769 [HIGH] TRIE Remote Code Execution Vulnerability TRIE Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in the way that certain Windows components handle the loading of DLL files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured
msrc
CVE-2017-8702HIGHCVSS 7.52017-09-12
CVE-2017-8702 [HIGH] Windows Error Reporting Elevation of Privilege Vulnerability Windows Error Reporting Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it. An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functional
msrc
CVE-2017-8628HIGHCVSS 8.12017-09-12
CVE-2017-8628 [MEDIUM] Microsoft Bluetooth Driver Spoofing Vulnerability Microsoft Bluetooth Driver Spoofing Vulnerability Description: A spoofing vulnerability exists in Microsoft's implementation of the Bluetooth stack. An attacker who successfully exploited this vulnerability could perform a man-in-the-middle attack and force a user's computer to unknowingly route traffic through the attacker's computer. The attacker can then monitor and read the traffic before sending it on to the intended
msrc
CVE-2017-8692MEDIUMCVSS 5.02017-09-12
CVE-2017-8692 [HIGH] Windows Uniscribe Remote Code Execution Vulnerability Windows Uniscribe Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configure
msrc
CVE-2017-8591HIGHCVSS 8.82017-08-08
CVE-2017-8591 [HIGH] Windows IME Remote Code Execution Vulnerability Windows IME Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Windows Input Method Editor (IME) when IME improperly handles parameters in a method of a DCOM class. The DCOM server is a Windows component installed regardless of which languages/IMEs are enabled. An attacker can instantiate the DCOM class and exploit the system even if IME is not enabled. To exploit this vulnerabilit
msrc
CVE-2017-0293LOWCVSS 3.62017-08-08
CVE-2017-0293 [HIGH] Windows PDF Remote Code Execution Vulnerability Windows PDF Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the
msrc
CVE-2017-8561HIGHCVSS 7.02017-07-11
CVE-2017-8561 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerabi
msrc
CVE-2017-8562HIGHCVSS 7.02017-07-11
CVE-2017-8562 [HIGH] Windows ALPC Elevation of Privilege Vulnerability Windows ALPC Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user ri
msrc
CVE-2017-8494HIGHCVSS 7.02017-06-13
CVE-2017-8494 [HIGH] Windows Elevation of Privilege Vulnerability Windows Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory. To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL). The security up
msrc
CVE-2017-8576HIGHCVSS 7.02017-06-13
CVE-2017-8576 [HIGH] Microsoft Graphics Component Elevation of Privilege Vulnerability Microsoft Graphics Component Elevation of Privilege Vulnerability Description: An Elevation of Privilege vulnerability exists when the Windows Graphics component improperly initializes contents in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user
msrc
CVE-2017-8465HIGHCVSS 7.02017-06-13
CVE-2017-8465 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2017-8579HIGHCVSS 7.02017-06-13
CVE-2017-8579 [HIGH] DirectX Elevation of Privilege Vulnerability DirectX Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have t
msrc
CVE-2017-8466HIGHCVSS 7.02017-06-13
CVE-2017-8466 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2017-8468HIGHCVSS 7.02017-06-13
CVE-2017-8468 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2017-0219MEDIUMCVSS 5.32017-06-13
CVE-2017-0219 [MEDIUM] Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the
msrc
CVE-2017-8493MEDIUMCVSS 5.62017-06-13
CVE-2017-8493 [MEDIUM] Windows Security Feature Bypass Vulnerability Windows Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists when Microsoft Windows fails to enforce case sensitivity for certain variable checks, which could allow an attacker to set variables that are either read-only or require authentication. To exploit this vulnerability, an attacker could run a specially crafted application to bypass Unified Extensible Firmware Interface (UEFI
msrc
CVE-2017-8575MEDIUMCVSS 4.72017-06-13
CVE-2017-8575 [MEDIUM] Microsoft Graphics Component Information Disclosure Vulnerability Microsoft Graphics Component Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially craf
msrc
CVE-2017-0218MEDIUMCVSS 5.32017-06-13
CVE-2017-0218 [MEDIUM] Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Device Guard Code Integrity Policy Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the
msrc