Msrc Windows 10 Version 1903 vulnerabilities

891 known vulnerabilities affecting msrc/windows_10_version_1903.

Total CVEs
891
CISA KEV
21
actively exploited
Public exploits
35
Exploited in wild
23
Severity breakdown
CRITICAL4HIGH655MEDIUM228LOW4

Vulnerabilities

Page 21 of 45
CVE-2020-0909HIGHCVSS 7.52020-05-12
CVE-2020-0909 [HIGH] Windows Hyper-V Denial of Service Vulnerability Windows Hyper-V Denial of Service Vulnerability Description: A denial of service vulnerability exists when Hyper-V on a Windows Server fails to properly handle specially crafted network packets. To exploit the vulnerability, an attacker would send specially crafted network packets to the Hyper-V Server. The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to properly handle these
msrc
CVE-2020-1143HIGHCVSS 7.02020-05-12
CVE-2020-1143 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2020-1149HIGHCVSS 7.02020-05-12
CVE-2020-1149 [HIGH] Windows Runtime Elevation of Privilege Vulnerability Windows Runtime Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnera
msrc
CVE-2020-1190HIGHCVSS 7.82020-05-12
CVE-2020-1190 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability Windows State Repository Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1070HIGHCVSS 7.82020-05-12
CVE-2020-1070 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability Windows Print Spooler Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new acco
msrc
CVE-2020-1081HIGHCVSS 7.82020-05-12
CVE-2020-1081 [HIGH] Windows Printer Service Elevation of Privilege Vulnerability Windows Printer Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers. An authenticated attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. To exploit this vulnerability, an attacker would first have to log on
msrc
CVE-2020-1077HIGHCVSS 7.82020-05-12
CVE-2020-1077 [HIGH] Windows Runtime Elevation of Privilege Vulnerability Windows Runtime Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnera
msrc
CVE-2020-1125HIGHCVSS 7.02020-05-12
CVE-2020-1125 [HIGH] Windows Runtime Elevation of Privilege Vulnerability Windows Runtime Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnera
msrc
CVE-2020-1153HIGHCVSS 7.82020-05-12
CVE-2020-1153 [HIGH] Microsoft Graphics Components Remote Code Execution Vulnerability Microsoft Graphics Components Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresse
msrc
CVE-2020-1054HIGHCVSS 7.0KEVPoC2020-05-12
CVE-2020-1054 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2020-1134HIGHCVSS 7.82020-05-12
CVE-2020-1134 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability Windows State Repository Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1061HIGHCVSS 7.52020-05-12
CVE-2020-1061 [HIGH] Microsoft Script Runtime Remote Code Execution Vulnerability Microsoft Script Runtime Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in the way that the Microsoft Script Runtime handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as
msrc
CVE-2020-1138HIGHCVSS 7.02020-05-12
CVE-2020-1138 [HIGH] Windows Storage Service Elevation of Privilege Vulnerability Windows Storage Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially craf
msrc
CVE-2020-1136HIGHCVSS 7.82020-05-12
CVE-2020-1136 [HIGH] Media Foundation Memory Corruption Vulnerability Media Foundation Memory Corruption Vulnerability Description: A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to
msrc
CVE-2020-1051HIGHCVSS 7.82020-05-12
CVE-2020-1051 [HIGH] Jet Database Engine Remote Code Execution Vulnerability Jet Database Engine Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the v
msrc
CVE-2020-1156HIGHCVSS 7.82020-05-12
CVE-2020-1156 [HIGH] Windows Runtime Elevation of Privilege Vulnerability Windows Runtime Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnera
msrc
CVE-2020-1132HIGHCVSS 7.02020-05-12
CVE-2020-1132 [HIGH] Windows Error Reporting Manager Elevation of Privilege Vulnerability Windows Error Reporting Manager Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles file and folder links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the sys
msrc
CVE-2020-1068HIGHCVSS 7.82020-05-12
CVE-2020-1068 [HIGH] Microsoft Windows Elevation of Privilege Vulnerability Microsoft Windows Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows Media Service that allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update ad
msrc
CVE-2020-1144HIGHCVSS 7.82020-05-12
CVE-2020-1144 [HIGH] Windows State Repository Service Elevation of Privilege Vulnerability Windows State Repository Service Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on
msrc
CVE-2020-1028HIGHCVSS 7.82020-05-12
CVE-2020-1028 [HIGH] Media Foundation Memory Corruption Vulnerability Media Foundation Memory Corruption Vulnerability Description: A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to
msrc