Msrc Windows 10 Version 1607 vulnerabilities
3,534 known vulnerabilities affecting msrc/windows_10_version_1607.
Total CVEs
3,534
CISA KEV
145
actively exploited
Public exploits
181
Exploited in wild
135
Severity breakdown
CRITICAL59HIGH2428MEDIUM1020LOW27
Vulnerabilities
Page 2 of 177
CVE-2026-25187HIGHCVSS 7.82026-03-10
CVE-2026-25187 [HIGH] CWE-59 Winlogon Elevation of Privilege Vulnerability
Winlogon Elevation of Privilege Vulnerability
Description: Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Winlogon: Winlogon
Microsoft: Microsoft
msrc
CVE-2026-25190HIGHCVSS 7.82026-03-10
CVE-2026-25190 [HIGH] CWE-426 GDI Remote Code Execution Vulnerability
GDI Remote Code Execution Vulnerability
Description: Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally.
FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?
The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Executio
msrc
CVE-2026-23674HIGHCVSS 7.52026-03-10
CVE-2026-23674 [HIGH] CWE-41 MapUrlToZone Security Feature Bypass Vulnerability
MapUrlToZone Security Feature Bypass Vulnerability
Description: Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited the vulnerability could bypass the MapURLToZone method.
FAQ: The Security
msrc
CVE-2026-25178HIGHCVSS 7.02026-03-10
CVE-2026-25178 [HIGH] CWE-416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Description: Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could g
msrc
CVE-2026-25165HIGHCVSS 7.82026-03-10
CVE-2026-25165 [HIGH] CWE-476 Performance Counters for Windows Elevation of Privilege Vulnerability
Performance Counters for Windows Elevation of Privilege Vulnerability
Description: Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows P
msrc
CVE-2026-25172HIGHCVSS 8.02026-03-10
CVE-2026-25172 [HIGH] CWE-190 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
Description: Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker authenticated on the domain could exploit this vulnerability by tricking
msrc
CVE-2026-25177HIGHCVSS 8.82026-03-10
CVE-2026-25177 [HIGH] CWE-641 Active Directory Domain Services Elevation of Privilege Vulnerability
Active Directory Domain Services Elevation of Privilege Vulnerability
Description: Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerab
msrc
CVE-2026-23669HIGHCVSS 8.82026-03-10
CVE-2026-23669 [HIGH] CWE-416 RPC Runtime Library Remote Code Execution Vulnerability
RPC Runtime Library Remote Code Execution Vulnerability
Description: Use after free in RPC Runtime allows an authorized attacker to execute code over a network.
FAQ: How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by sending specially crafted network responses to a system running the Windows Print Spooler service. These malformed responses may cause the service t
msrc
CVE-2026-25185MEDIUMCVSS 5.32026-03-10
CVE-2026-25185 [MEDIUM] CWE-200 Windows Shell Link Processing Spoofing Vulnerability
Windows Shell Link Processing Spoofing Vulnerability
Description: Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network.
FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L),but lead to no loss of availability (A:N) and integrity
msrc
CVE-2026-25169MEDIUMCVSS 6.22026-03-10
CVE-2026-25169 [MEDIUM] CWE-369 Windows Graphics Component Denial of Service Vulnerability
Windows Graphics Component Denial of Service Vulnerability
Description: Divide by zero in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Les
msrc
CVE-2026-25180MEDIUMCVSS 5.52026-03-10
CVE-2026-25180 [MEDIUM] CWE-125 Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
Description: Out-of-bounds read in Microsoft Graphics Component allows an unauthorized attacker to disclose information locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
A user would need to be tricked into opening a folder that contains a specially crafted file.
msrc
CVE-2026-25168MEDIUMCVSS 6.22026-03-10
CVE-2026-25168 [MEDIUM] CWE-476 Windows Graphics Component Denial of Service Vulnerability
Windows Graphics Component Denial of Service Vulnerability
Description: Null pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to deny service locally.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploi
msrc
CVE-2026-25186MEDIUMCVSS 5.52026-03-10
CVE-2026-25186 [MEDIUM] CWE-200 Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability
Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability
Description: Exposure of sensitive information to an unauthorized actor in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to disclose information locally.
FAQ: What type of information could be disclosed by this vulnerability?
The type of information th
msrc
CVE-2026-21248HIGHCVSS 7.32026-02-10
CVE-2026-21248 [HIGH] CWE-122 Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
Description: Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
The file must be stored in a location that allows an attacker write access, enabling the file to
msrc
CVE-2026-21255HIGHCVSS 8.82026-02-10
CVE-2026-21255 [HIGH] CWE-284 Windows Hyper-V Security Feature Bypass Vulnerability
Windows Hyper-V Security Feature Bypass Vulnerability
Description: Improper access control in Windows Hyper-V allows an authorized attacker to bypass a security feature locally.
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
An attacker who successfully exploited this vulnerability could bypass the Virtualization-based Security feature.
FAQ: How could an att
msrc
CVE-2026-21508HIGHCVSS 7.02026-02-10
CVE-2026-21508 [HIGH] CWE-287 Windows Storage Elevation of Privilege Vulnerability
Windows Storage Elevation of Privilege Vulnerability
Description: Improper authentication in Windows Storage allows an authorized attacker to elevate privileges locally.
FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliabil
msrc
CVE-2026-20846HIGHCVSS 7.52026-02-10
CVE-2026-20846 [HIGH] CWE-126 GDI+ Denial of Service Vulnerability
GDI+ Denial of Service Vulnerability
Description: Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network.
Windows GDI+: Windows GDI+
Microsoft: Microsoft
Customer Action Required: Yes
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB507
msrc
CVE-2026-21239HIGHCVSS 7.82026-02-10
CVE-2026-21239 [HIGH] CWE-122 Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Windows Kernel: Windows Kernel
Microsoft: Microsoft
Cus
msrc
CVE-2026-21235HIGHCVSS 7.32026-02-10
CVE-2026-21235 [HIGH] CWE-416 Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.
FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ: According to the CVSS metr
msrc
CVE-2026-21247HIGHCVSS 7.32026-02-10
CVE-2026-21247 [HIGH] CWE-20 Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
Description: Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally.
FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?
The file must be stored in a location that allows an attacker write access, enabling the file to b
msrc