Msrc Windows 10 Version 1909 vulnerabilities
1,250 known vulnerabilities affecting msrc/windows_10_version_1909.
Total CVEs
1,250
CISA KEV
34
actively exploited
Public exploits
20
Exploited in wild
38
Severity breakdown
CRITICAL15HIGH936MEDIUM295LOW4
Vulnerabilities
Page 12 of 63
CVE-2021-43219HIGHCVSS 7.42021-12-14
CVE-2021-43219 [HIGH] DirectX Graphics Kernel File Denial of Service Vulnerability
DirectX Graphics Kernel File Denial of Service Vulnerability
Windows DirectX: Windows DirectX
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microso
msrc
CVE-2021-43893HIGHCVSS 7.52021-12-14
CVE-2021-43893 [HIGH] Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
Windows Encrypting File System (EFS): Windows Encrypting File System (EFS)
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microso
msrc
CVE-2021-43883HIGHCVSS 7.82021-12-14
CVE-2021-43883 [HIGH] Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft
msrc
CVE-2021-43238HIGHCVSS 7.82021-12-14
CVE-2021-43238 [HIGH] Windows Remote Access Elevation of Privilege Vulnerability
Windows Remote Access Elevation of Privilege Vulnerability
Windows Remote Access Connection Manager: Windows Remote Access Connection Manager
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.a
msrc
CVE-2021-43248HIGHCVSS 7.82021-12-14
CVE-2021-43248 [HIGH] Windows Digital Media Receiver Elevation of Privilege Vulnerability
Windows Digital Media Receiver Elevation of Privilege Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search
msrc
CVE-2021-43236HIGHCVSS 7.52021-12-14
CVE-2021-43236 [HIGH] Microsoft Message Queuing Information Disclosure Vulnerability
Microsoft Message Queuing Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Windows Message Queuing: Windows Message Queuing
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploi
msrc
CVE-2021-43207HIGHCVSS 7.8Exploited2021-12-14
CVE-2021-43207 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.micr
msrc
CVE-2021-43217HIGHCVSS 8.12021-12-14
CVE-2021-43217 [HIGH] Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
FAQ: What is the attack vector for this vulnerability?
An attacker could cause a buffer overflow write leading to unauthenticated non-sandboxed code execution.
Does EFS need to be in use for this to be exploited?
No. EFS interfaces trigger a start to the EFS service if it isn’t already running.
How does Microsoft plan to address
msrc
CVE-2021-43229HIGHCVSS 7.82021-12-14
CVE-2021-43229 [HIGH] Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft.com/help/5008218
Re
msrc
CVE-2021-43231HIGHCVSS 7.82021-12-14
CVE-2021-43231 [HIGH] Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft.com/help/5008218
Re
msrc
CVE-2021-43247HIGHCVSS 7.82021-12-14
CVE-2021-43247 [HIGH] Windows TCP/IP Driver Elevation of Privilege Vulnerability
Windows TCP/IP Driver Elevation of Privilege Vulnerability
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsof
msrc
CVE-2021-43233HIGHCVSS 7.52021-12-14
CVE-2021-43233 [HIGH] Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client: Remote Desktop Client
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://suppo
msrc
CVE-2021-43226HIGHCVSS 7.8KEV2021-12-14
CVE-2021-43226 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.micr
msrc
CVE-2021-41333HIGHCVSS 7.82021-12-14
CVE-2021-41333 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
msrc
CVE-2021-43230HIGHCVSS 7.82021-12-14
CVE-2021-43230 [HIGH] Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS: Windows NTFS
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft.com/help/5008218
Re
msrc
CVE-2021-43228HIGHCVSS 7.52021-12-14
CVE-2021-43228 [HIGH] SymCrypt Denial of Service Vulnerability
SymCrypt Denial of Service Vulnerability
Windows SymCrypt: Windows SymCrypt
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://support.microsoft.com/help/5008218
Reference: https:
msrc
CVE-2021-43232HIGHCVSS 7.82021-12-14
CVE-2021-43232 [HIGH] Windows Event Tracing Remote Code Execution Vulnerability
Windows Event Tracing Remote Code Execution Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://suppo
msrc
CVE-2021-43222HIGHCVSS 7.52021-12-14
CVE-2021-43222 [HIGH] Microsoft Message Queuing Information Disclosure Vulnerability
Microsoft Message Queuing Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
Windows Message Queuing: Windows Message Queuing
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest
msrc
CVE-2021-43234HIGHCVSS 7.82021-12-14
CVE-2021-43234 [HIGH] Windows Fax Service Remote Code Execution Vulnerability
Windows Fax Service Remote Code Execution Vulnerability
Role: Windows Fax Service: Role: Windows Fax Service
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218
Reference: https://s
msrc
CVE-2021-43216MEDIUMCVSS 6.52021-12-14
CVE-2021-43216 [MEDIUM] Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read access to memory contents in kernel space from a user mode process.
Microsoft Local
msrc