Msrc Windows 10 Version 1709 For X64-Based Systems vulnerabilities
205 known vulnerabilities affecting msrc/windows_10_version_1709_for_x64-based_systems.
Total CVEs
205
CISA KEV
8
actively exploited
Public exploits
34
Exploited in wild
8
Severity breakdown
CRITICAL1HIGH117MEDIUM85LOW2
Vulnerabilities
Page 1 of 11
CVE-2020-1047HIGHCVSS 7.82020-10-13
CVE-2020-1047 [HIGH] Windows Hyper-V Elevation of Privilege Vulnerability
Windows Hyper-V Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory. An attacker who successfully exploited these vulnerabilities could gain elevated privileges on a target operating system.
This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be u
msrc
CVE-2020-1243HIGHCVSS 7.82020-10-13
CVE-2020-1243 [HIGH] Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
Description: A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.
To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.
The security up
msrc
CVE-2020-16885HIGHCVSS 7.82020-10-13
CVE-2020-16885 [HIGH] Windows Storage VSP Driver Elevation of Privilege Vulnerability
Windows Storage VSP Driver Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Storage VSP Driver improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.
To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a spec
msrc
CVE-2020-17022HIGHCVSS 7.82020-10-13
CVE-2020-17022 [HIGH] Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code.
Exploitation of the vulnerability requires that a program process a specially crafted image file.
The update addresses
msrc
CVE-2020-0870HIGHCVSS 7.82020-09-08
CVE-2020-0870 [HIGH] Shell infrastructure component Elevation of Privilege Vulnerability
Shell infrastructure component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Shell infrastructure component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could
msrc
CVE-2020-1560HIGHCVSS 7.32020-08-11
CVE-2020-1560 [HIGH] Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full u
msrc
CVE-2020-1585HIGHCVSS 8.82020-08-11
CVE-2020-1585 [HIGH] Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full u
msrc
CVE-2020-1199HIGHCVSS 7.82020-06-09
CVE-2020-1199 [HIGH] Windows Feedback Hub Elevation of Privilege Vulnerability
Windows Feedback Hub Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Feedback Hub improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
To exploit this vulnerability, an attacker would first have to log on to the system with Windows Mixed Reality installed. An attacke
msrc
CVE-2020-1457HIGHCVSS 7.32020-06-09
CVE-2020-1457 [HIGH] Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code.
Exploitation of the vulnerability requires that a program process a specially crafted image file.
The update addresses
msrc
CVE-2020-1425HIGHCVSS 7.32020-06-09
CVE-2020-1425 [HIGH] Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
Exploitation of the vulnerability requires that a program process a specially craf
msrc
CVE-2020-1151HIGHCVSS 7.02020-05-12
CVE-2020-1151 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1087HIGHCVSS 7.82020-05-12
CVE-2020-1087 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerabi
msrc
CVE-2020-1135HIGHCVSS 7.82020-05-12
CVE-2020-1135 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2020-1137HIGHCVSS 7.82020-05-12
CVE-2020-1137 [HIGH] Windows Push Notification Service Elevation of Privilege Vulnerability
Windows Push Notification Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way the Windows Push Notification Service handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data.
To exploit this vulnerabilit
msrc
CVE-2020-1110HIGHCVSS 7.82020-05-12
CVE-2020-1110 [HIGH] Windows Update Stack Elevation of Privilege Vulnerability
Windows Update Stack Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit t
msrc
CVE-2020-1118HIGHCVSS 8.62020-05-12
CVE-2020-1118 [HIGH] Microsoft Windows Transport Layer Security Denial of Service Vulnerability
Microsoft Windows Transport Layer Security Denial of Service Vulnerability
Description: A denial of service vulnerability exists in the Windows implementation of Transport Layer Security (TLS) when it improperly handles certain key exchanges. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.
To exploit this vulnerability, a remote unauthenticated
msrc
CVE-2020-1142HIGHCVSS 7.82020-05-12
CVE-2020-1142 [HIGH] Windows GDI Elevation of Privilege Vulnerability
Windows GDI Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this v
msrc
CVE-2020-1155HIGHCVSS 7.82020-05-12
CVE-2020-1155 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1109HIGHCVSS 7.82020-05-12
CVE-2020-1109 [HIGH] Windows Update Stack Elevation of Privilege Vulnerability
Windows Update Stack Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit t
msrc
CVE-2020-0888HIGHCVSS 7.82020-04-14
CVE-2020-0888 [HIGH] DirectX Elevation of Privilege Vulnerability
DirectX Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would first have t
msrc
1 / 11Next →