Msrc Windows 10 Version 1703 vulnerabilities

574 known vulnerabilities affecting msrc/windows_10_version_1703.

Total CVEs
574
CISA KEV
25
actively exploited
Public exploits
110
Exploited in wild
30
Severity breakdown
CRITICAL6HIGH297MEDIUM259LOW12

Vulnerabilities

Page 3 of 29
CVE-2019-1256HIGHCVSS 7.82019-09-10
CVE-2019-1256 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an
msrc
CVE-2019-1290HIGHCVSS 7.52019-09-10
CVE-2019-1290 [HIGH] Remote Desktop Client Remote Code Execution Vulnerability Remote Desktop Client Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts
msrc
CVE-2019-1292HIGHCVSS 7.82019-09-10
CVE-2019-1292 [MEDIUM] Windows Elevation of Privilege Vulnerability Windows Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Microsoft Windows when Windows fails to properly handle certain symbolic links. An attacker who successfully exploited this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions. To exploit this vulnerability, an attacker would first have to log on to the system. An att
msrc
CVE-2019-1285HIGHCVSS 7.82019-09-10
CVE-2019-1285 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an
msrc
CVE-2019-1247HIGHCVSS 7.82019-09-10
CVE-2019-1247 [HIGH] Jet Database Engine Remote Code Execution Vulnerability Jet Database Engine Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the v
msrc
CVE-2019-1249HIGHCVSS 7.82019-09-10
CVE-2019-1249 [HIGH] Jet Database Engine Remote Code Execution Vulnerability Jet Database Engine Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the v
msrc
CVE-2019-0787HIGHCVSS 7.52019-09-10
CVE-2019-0787 [HIGH] Remote Desktop Client Remote Code Execution Vulnerability Remote Desktop Client Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts
msrc
CVE-2019-1240HIGHCVSS 7.82019-09-10
CVE-2019-1240 [HIGH] Jet Database Engine Remote Code Execution Vulnerability Jet Database Engine Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the v
msrc
CVE-2019-1246HIGHCVSS 7.82019-09-10
CVE-2019-1246 [HIGH] Jet Database Engine Remote Code Execution Vulnerability Jet Database Engine Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the v
msrc
CVE-2019-1244MEDIUMCVSS 6.5PoC2019-09-10
CVE-2019-1244 [MEDIUM] DirectWrite Information Disclosure Vulnerability DirectWrite Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted doc
msrc
CVE-2019-1270MEDIUMCVSS 6.32019-09-10
CVE-2019-1270 [MEDIUM] Microsoft Windows Store Installer Elevation of Privilege Vulnerability Microsoft Windows Store Installer Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows store installer where WindowsApps directory is vulnerable to symbolic link attack. An attacker who successfully exploited this vulnerability could bypass access restrictions to add or remove files. To exploit this vulnerability, an attacker would first have to lo
msrc
CVE-2019-1219MEDIUMCVSS 5.52019-09-10
CVE-2019-1219 [MEDIUM] Windows Transaction Manager Information Disclosure Vulnerability Windows Transaction Manager Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows Transaction Manager improperly handles objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. To exploit the vulnerability, an attacker would first have to log on to the system, an
msrc
CVE-2019-1293MEDIUMCVSS 5.52019-09-10
CVE-2019-1293 [MEDIUM] Windows SMB Client Driver Information Disclosure Vulnerability Windows SMB Client Driver Information Disclosure Vulnerability Description: An information disclosure vulnerability exists in Windows when the Windows SMB Client kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could potentially disclose contents of System memory. To exploit this vulnerability, an attacker would have to log on to the system
msrc
CVE-2019-1286MEDIUMCVSS 5.52019-09-10
CVE-2019-1286 [MEDIUM] Windows GDI Information Disclosure Vulnerability Windows GDI Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a special
msrc
CVE-2019-1272MEDIUMCVSS 6.32019-09-10
CVE-2019-1272 [HIGH] Windows Data Sharing Service Elevation of Privilege Vulnerability Windows Data Sharing Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
msrc
CVE-2019-1268MEDIUMCVSS 6.52019-09-10
CVE-2019-1268 [HIGH] Winlogon Elevation of Privilege Vulnerability Winlogon Elevation of Privilege Vulnerability Description: An elevation of privilege exists when Winlogon does not properly handle file path information. An attacker who successfully exploited this vulnerability could run arbitrary code. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the
msrc
CVE-2019-1282MEDIUMCVSS 5.52019-09-10
CVE-2019-1282 [MEDIUM] Windows Common Log File System Driver Information Disclosure Vulnerability Windows Common Log File System Driver Information Disclosure Vulnerability Description: An information disclosure exists in the Windows Common Log File System (CLFS) driver when it fails to properly handle sandbox checks. An attacker who successfully exploited this vulnerability could potentially read data outside their expected limits. To exploit the vulnerability, an attacker would first have to
msrc
CVE-2019-1245MEDIUMCVSS 6.5PoC2019-09-10
CVE-2019-1245 [MEDIUM] DirectWrite Information Disclosure Vulnerability DirectWrite Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted doc
msrc
CVE-2019-1252MEDIUMCVSS 5.52019-09-10
CVE-2019-1252 [MEDIUM] Windows GDI Information Disclosure Vulnerability Windows GDI Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a special
msrc
CVE-2019-1269MEDIUMCVSS 6.32019-09-10
CVE-2019-1269 [HIGH] Windows ALPC Elevation of Privilege Vulnerability Windows ALPC Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user ri
msrc