Msrc Windows 10 Version 1803 vulnerabilities
1,242 known vulnerabilities affecting msrc/windows_10_version_1803.
Total CVEs
1,242
CISA KEV
32
actively exploited
Public exploits
63
Exploited in wild
37
Severity breakdown
CRITICAL10HIGH871MEDIUM349LOW12
Vulnerabilities
Page 42 of 63
CVE-2019-1466MEDIUMCVSS 5.52019-12-10
CVE-2019-1466 [MEDIUM] Windows GDI Information Disclosure Vulnerability
Windows GDI Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a special
msrc
CVE-2019-1472MEDIUMCVSS 5.52019-12-10
CVE-2019-1472 [MEDIUM] Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
msrc
CVE-2019-1465MEDIUMCVSS 5.52019-12-10
CVE-2019-1465 [MEDIUM] Windows GDI Information Disclosure Vulnerability
Windows GDI Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a special
msrc
CVE-2019-1467MEDIUMCVSS 5.52019-12-10
CVE-2019-1467 [MEDIUM] Windows GDI Information Disclosure Vulnerability
Windows GDI Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a special
msrc
CVE-2019-1488LOWCVSS 3.32019-12-10
CVE-2019-1488 [LOW] Microsoft Defender Security Feature Bypass Vulnerability
Microsoft Defender Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists when Microsoft Defender improperly handles specific buffers. An attacker could exploit the vulnerability to trigger warnings and false positives when no threat is present.
To exploit the vulnerability, an attacker would first require execution permissions on the victim system.
The security update address
msrc
CVE-2019-1415HIGHCVSS 7.82019-11-12
CVE-2019-1415 [HIGH] Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations.
To exploit the vulnerability, an attacker would require unprivileged execution on the victim system. After successfully exploiting the vulnerability, an attacker could run arbitrary code with elevated privileges
msrc
CVE-2019-1433HIGHCVSS 7.02019-11-12
CVE-2019-1433 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2019-1393HIGHCVSS 7.82019-11-12
CVE-2019-1393 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2019-1382HIGHCVSS 7.82019-11-12
CVE-2019-1382 [MEDIUM] Microsoft ActiveX Installer Service Elevation of Privilege Vulnerability
Microsoft ActiveX Installer Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when ActiveX Installer service may allow access to files without proper authentication. An attacker who successfully exploited the vulnerability could potentially access unauthorized files.
To exploit this vulnerability, an authenticated attacker could run a specially c
msrc
CVE-2019-1395HIGHCVSS 7.82019-11-12
CVE-2019-1395 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2019-1388HIGHCVSS 7.8KEV2019-11-12
CVE-2019-1388 [HIGH] Windows Certificate Dialog Elevation of Privilege Vulnerability
Windows Certificate Dialog Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data.
To exploit this vulnerability, an
msrc
CVE-2019-1384HIGHCVSS 8.52019-11-12
CVE-2019-1384 [CRITICAL] Microsoft Windows Security Feature Bypass Vulnerability
Microsoft Windows Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.
To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges.
The
msrc
CVE-2019-1396HIGHCVSS 7.82019-11-12
CVE-2019-1396 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2019-1394HIGHCVSS 7.82019-11-12
CVE-2019-1394 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2019-1424HIGHCVSS 8.12019-11-12
CVE-2019-1424 [HIGH] NetLogon Security Feature Bypass Vulnerability
NetLogon Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists when Windows Netlogon improperly handles a secure communications channel. An attacker who successfully exploited the vulnerability could downgrade aspects of the connection allowing for further modification of the transmission.
To exploit the vulnerability, an attacker would require an active man in the middle attack to be
msrc
CVE-2019-1417HIGHCVSS 7.82019-11-12
CVE-2019-1417 [HIGH] Windows Data Sharing Service Elevation of Privilege Vulnerability
Windows Data Sharing Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
msrc
CVE-2019-1420HIGHCVSS 7.82019-11-12
CVE-2019-1420 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the dssvc.dll handles file creation allowing for a file overwrite or creation in a secured location. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
Th
msrc
CVE-2019-1438HIGHCVSS 7.02019-11-12
CVE-2019-1438 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2019-1422HIGHCVSS 7.82019-11-12
CVE-2019-1422 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the iphlpsvc.dll handles file creation allowing for a file overwrite. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the
msrc
CVE-2019-1397HIGHCVSS 7.62019-11-12
CVE-2019-1397 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.
msrc