Msrc Windows 10 Version 1803 vulnerabilities

1,242 known vulnerabilities affecting msrc/windows_10_version_1803.

Total CVEs
1,242
CISA KEV
32
actively exploited
Public exploits
63
Exploited in wild
37
Severity breakdown
CRITICAL10HIGH871MEDIUM349LOW12

Vulnerabilities

Page 7 of 63
CVE-2021-1669HIGHCVSS 8.82021-01-12
CVE-2021-1669 [HIGH] Windows Remote Desktop Security Feature Bypass Vulnerability Windows Remote Desktop Security Feature Bypass Vulnerability FAQ: How do I get the update for Microsoft Remote Desktop for Android? Tap the Google Play icon on your home screen. Swipe in from the left edge of the screen. Tap My apps & games. Tap the Update box next to the Remote Desktop app. Windows Remote Desktop: Windows Remote Desktop Microsoft: Microsoft Customer Action Required: Yes Impact: Security Fea
msrc
CVE-2021-1661HIGHCVSS 7.82021-01-12
CVE-2021-1661 [HIGH] Windows Installer Elevation of Privilege Vulnerability Windows Installer Elevation of Privilege Vulnerability Windows Installer: Windows Installer Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242 Referen
msrc
CVE-2021-1700HIGHCVSS 8.82021-01-12
CVE-2021-1700 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime Microsoft: Microsoft Customer Action Required: Yes Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.
msrc
CVE-2021-1685HIGHCVSS 7.32021-01-12
CVE-2021-1685 [HIGH] Windows AppX Deployment Extensions Elevation of Privilege Vulnerability Windows AppX Deployment Extensions Elevation of Privilege Vulnerability Windows AppX Deployment Extensions: Windows AppX Deployment Extensions Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://c
msrc
CVE-2021-1693HIGHCVSS 7.82021-01-12
CVE-2021-1693 [HIGH] Windows CSC Service Elevation of Privilege Vulnerability Windows CSC Service Elevation of Privilege Vulnerability Windows CSC Service: Windows CSC Service Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
msrc
CVE-2021-1702HIGHCVSS 7.82021-01-12
CVE-2021-1702 [HIGH] Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability Windows Remote Procedure Call: Windows Remote Procedure Call Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catal
msrc
CVE-2021-1651HIGHCVSS 7.82021-01-12
CVE-2021-1651 [HIGH] Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability Windows Diagnostic Hub: Windows Diagnostic Hub Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.
msrc
CVE-2021-1671HIGHCVSS 8.82021-01-12
CVE-2021-1671 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime Microsoft: Microsoft Customer Action Required: Yes Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.
msrc
CVE-2021-1654HIGHCVSS 7.82021-01-12
CVE-2021-1654 [HIGH] Windows CSC Service Elevation of Privilege Vulnerability Windows CSC Service Elevation of Privilege Vulnerability Windows CSC Service: Windows CSC Service Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
msrc
CVE-2021-1694HIGHCVSS 7.52021-01-12
CVE-2021-1694 [HIGH] Windows Update Stack Elevation of Privilege Vulnerability Windows Update Stack Elevation of Privilege Vulnerability FAQ: What is the attack vector for this vulnerability? To exploit this vulnerability, an attacker would need to launch a machine-in-the-middle (MITM) attack against the traffic passing between a domain controller and the target machine. Windows Update Stack: Windows Update Stack Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privil
msrc
CVE-2021-1704HIGHCVSS 7.32021-01-12
CVE-2021-1704 [HIGH] Windows Hyper-V Elevation of Privilege Vulnerability Windows Hyper-V Elevation of Privilege Vulnerability Windows Hyper-V: Windows Hyper-V Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242 Reference: http
msrc
CVE-2021-1652HIGHCVSS 7.82021-01-12
CVE-2021-1652 [HIGH] Windows CSC Service Elevation of Privilege Vulnerability Windows CSC Service Elevation of Privilege Vulnerability Windows CSC Service: Windows CSC Service Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
msrc
CVE-2021-1642HIGHCVSS 7.82021-01-12
CVE-2021-1642 [HIGH] Windows AppX Deployment Extensions Elevation of Privilege Vulnerability Windows AppX Deployment Extensions Elevation of Privilege Vulnerability Windows AppX Deployment Extensions: Windows AppX Deployment Extensions Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://c
msrc
CVE-2021-1706HIGHCVSS 7.32021-01-12
CVE-2021-1706 [HIGH] Windows LUAFV Elevation of Privilege Vulnerability Windows LUAFV Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598245 Reference: http
msrc
CVE-2021-1689HIGHCVSS 7.82021-01-12
CVE-2021-1689 [HIGH] Windows Multipoint Management Elevation of Privilege Vulnerability Windows Multipoint Management Elevation of Privilege Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.a
msrc
CVE-2021-1660HIGHCVSS 8.82021-01-12
CVE-2021-1660 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime Microsoft: Microsoft Customer Action Required: Yes Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.
msrc
CVE-2021-1678HIGHCVSS 8.82021-01-12
CVE-2021-1678 [HIGH] Windows Print Spooler Spoofing Vulnerability Windows Print Spooler Spoofing Vulnerability FAQ: Where can I find more information about this security update? Please see KB4599464. Why are there no September 2021 security updates for Windows 10 Version 1803, Windows 10 Version 1903, or Windows Server, version 1909 (Server Core installation)? The September security updates are not available for these versions of Windows 10 and Windows Server because they are no longer in suppo
msrc
CVE-2021-1655HIGHCVSS 7.82021-01-12
CVE-2021-1655 [HIGH] Windows CSC Service Elevation of Privilege Vulnerability Windows CSC Service Elevation of Privilege Vulnerability Windows CSC Service: Windows CSC Service Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242
msrc
CVE-2021-1648HIGHCVSS 7.82021-01-12
CVE-2021-1648 [HIGH] Microsoft splwow64 Elevation of Privilege Vulnerability Microsoft splwow64 Elevation of Privilege Vulnerability FAQ: What type of information could be disclosed by this vulnerability? While this issue is labeled as an elevation of privilege, it can also be exploited to disclose information. The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. This CVE is marked as Publicly Disclosed. In what way wa
msrc
CVE-2021-1668HIGHCVSS 7.82021-01-12
CVE-2021-1668 [HIGH] Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability Microsoft DTV-DVD Video Decoder: Microsoft DTV-DVD Video Decoder Microsoft: Microsoft Customer Action Required: Yes Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.m
msrc