Msrc Windows 10 Version 1803 vulnerabilities

1,242 known vulnerabilities affecting msrc/windows_10_version_1803.

Total CVEs
1,242
CISA KEV
32
actively exploited
Public exploits
63
Exploited in wild
37
Severity breakdown
CRITICAL10HIGH871MEDIUM349LOW12

Vulnerabilities

Page 1 of 63
CVE-2021-28476CRITICALCVSS 9.92021-05-11
CVE-2021-28476 [CRITICAL] Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability FAQ: Under what circumstances might this vulnerability be exploited other than as a denial of service attack against a Hyper-V host? This issue allows a guest VM to force the Hyper-V host's kernel to read from an arbitrary, potentially invalid address. The contents of the address read would not be returned to the guest VM. In most circumstances, this would result in
msrc
CVE-2021-31193HIGHCVSS 7.82021-05-11
CVE-2021-31193 [HIGH] Windows SSDP Service Elevation of Privilege Vulnerability Windows SSDP Service Elevation of Privilege Vulnerability Windows SSDP Service: Windows SSDP Service Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174 Reference: https://catalo
msrc
CVE-2021-31188HIGHCVSS 7.82021-05-11
CVE-2021-31188 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability Microsoft Graphics Component: Microsoft Graphics Component Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500317
msrc
CVE-2021-31186HIGHCVSS 7.42021-05-11
CVE-2021-31186 [HIGH] Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. FAQ: How would an attacker exploit this vulnerability? An attacker would have to convince a targeted user to connect to a ma
msrc
CVE-2021-28455HIGHCVSS 8.82021-05-11
CVE-2021-28455 [HIGH] Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. FAQ: How do the security updates address this vulnerability? The security updates address the vulnerability by providing the ability to configure the Jet Red Data
msrc
CVE-2021-31194HIGHCVSS 8.82021-05-11
CVE-2021-31194 [HIGH] OLE Automation Remote Code Execution Vulnerability OLE Automation Remote Code Execution Vulnerability Windows OLE: Windows OLE Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174 Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2021-31182HIGHCVSS 7.12021-05-11
CVE-2021-31182 [HIGH] Microsoft Bluetooth Driver Spoofing Vulnerability Microsoft Bluetooth Driver Spoofing Vulnerability Microsoft Bluetooth Driver: Microsoft Bluetooth Driver Microsoft: Microsoft Impact: Spoofing Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174 Reference: https://catalog.update.microsoft
msrc
CVE-2020-24587MEDIUMCVSS 6.52021-05-11
CVE-2020-24587 [LOW] Windows Wireless Networking Information Disclosure Vulnerability Windows Wireless Networking Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could disclose the contents of encrypted wireless packets on an affected system. Windows Wireless Networking: Windows Wireless Networking MITRE Corporation: MITRE Corporation Impact: Information Disclosure Exploit
msrc
CVE-2020-24588MEDIUMCVSS 6.52021-05-11
CVE-2020-24588 [LOW] Windows Wireless Networking Spoofing Vulnerability Windows Wireless Networking Spoofing Vulnerability Windows Wireless Networking: Windows Wireless Networking MITRE Corporation: MITRE Corporation Impact: Spoofing Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174 Reference: https://catal
msrc
CVE-2020-26144MEDIUMCVSS 6.52021-05-11
CVE-2020-26144 [MEDIUM] Windows Wireless Networking Spoofing Vulnerability Windows Wireless Networking Spoofing Vulnerability Windows Wireless Networking: Windows Wireless Networking MITRE Corporation: MITRE Corporation Impact: Spoofing Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174 Reference: https://ca
msrc
CVE-2021-28479MEDIUMCVSS 5.52021-05-11
CVE-2021-28479 [MEDIUM] Windows CSC Service Information Disclosure Vulnerability Windows CSC Service Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Windows CSC Service: Windows CSC Service Microsof
msrc
CVE-2021-31184MEDIUMCVSS 5.52021-05-11
CVE-2021-31184 [MEDIUM] Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode
msrc
CVE-2021-28357HIGHCVSS 8.82021-04-13
CVE-2021-28357 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/S
msrc
CVE-2021-28334HIGHCVSS 8.82021-04-13
CVE-2021-28334 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/S
msrc
CVE-2021-28315HIGHCVSS 7.82021-04-13
CVE-2021-28315 [HIGH] Windows Media Video Decoder Remote Code Execution Vulnerability Windows Media Video Decoder Remote Code Execution Vulnerability FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. Ho
msrc
CVE-2021-28439HIGHCVSS 7.52021-04-13
CVE-2021-28439 [HIGH] Windows TCP/IP Driver Denial of Service Vulnerability Windows TCP/IP Driver Denial of Service Vulnerability Windows TCP/IP: Windows TCP/IP Microsoft: Microsoft Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001339 Reference: https://catalog.update.microsoft.com/v7
msrc
CVE-2021-28355HIGHCVSS 8.82021-04-13
CVE-2021-28355 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/S
msrc
CVE-2021-28342HIGHCVSS 8.82021-04-13
CVE-2021-28342 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/S
msrc
CVE-2021-26415HIGHCVSS 7.82021-04-13
CVE-2021-26415 [HIGH] Windows Installer Elevation of Privilege Vulnerability Windows Installer Elevation of Privilege Vulnerability Windows Installer: Windows Installer Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5001339 Reference: https://catalog.update.mic
msrc
CVE-2021-28313HIGHCVSS 7.82021-04-13
CVE-2021-28313 [HIGH] Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability Windows Diagnostic Hub: Windows Diagnostic Hub Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
1 / 63Next →