Msrc Windows 10 Version 1909 vulnerabilities

1,250 known vulnerabilities affecting msrc/windows_10_version_1909.

Total CVEs
1,250
CISA KEV
34
actively exploited
Public exploits
20
Exploited in wild
38
Severity breakdown
CRITICAL15HIGH936MEDIUM295LOW4

Vulnerabilities

Page 13 of 63
CVE-2021-43224MEDIUMCVSS 5.52021-12-14
CVE-2021-43224 [MEDIUM] Windows Common Log File System Driver Information Disclosure Vulnerability Windows Common Log File System Driver Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Common Log File System Dri
msrc
CVE-2021-43235MEDIUMCVSS 5.52021-12-14
CVE-2021-43235 [MEDIUM] Storage Spaces Controller Information Disclosure Vulnerability Storage Spaces Controller Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Storage: Windows Storage Microsoft: Microsoft Im
msrc
CVE-2021-43244MEDIUMCVSS 6.52021-12-14
CVE-2021-43244 [MEDIUM] Windows Kernel Information Disclosure Vulnerability Windows Kernel Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Kernel: Windows Kernel Microsoft: Microsoft Impact: Information Disclo
msrc
CVE-2021-43227MEDIUMCVSS 5.52021-12-14
CVE-2021-43227 [MEDIUM] Storage Spaces Controller Information Disclosure Vulnerability Storage Spaces Controller Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Storage Spaces Controller: Windows Storage Spaces
msrc
CVE-2021-41356HIGHCVSS 7.52021-11-09
CVE-2021-41356 [HIGH] Windows Denial of Service Vulnerability Windows Denial of Service Vulnerability Microsoft Windows: Microsoft Windows Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5007206 Reference: https://support.microsoft.com/help/500
msrc
CVE-2021-42276HIGHCVSS 7.82021-11-09
CVE-2021-42276 [HIGH] Microsoft Windows Media Foundation Remote Code Execution Vulnerability Microsoft Windows Media Foundation Remote Code Execution Vulnerability Microsoft Windows Codecs Library: Microsoft Windows Codecs Library Microsoft: Microsoft Customer Action Required: Yes Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.
msrc
CVE-2021-41370HIGHCVSS 7.82021-11-09
CVE-2021-41370 [HIGH] NTFS Elevation of Privilege Vulnerability NTFS Elevation of Privilege Vulnerability Windows NTFS: Windows NTFS Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5007206 Reference: https://support.microsoft.com/help/5007
msrc
CVE-2021-38666HIGHCVSS 8.82021-11-09
CVE-2021-38666 [HIGH] Remote Desktop Client Remote Code Execution Vulnerability Remote Desktop Client Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacker's server with the vulnerable Remote Desktop Client. Windows RDP: Windows RDP Microsoft: Microsoft
msrc
CVE-2021-36957HIGHCVSS 7.82021-11-09
CVE-2021-36957 [HIGH] Windows Desktop Bridge Elevation of Privilege Vulnerability Windows Desktop Bridge Elevation of Privilege Vulnerability Windows Desktop Bridge: Windows Desktop Bridge Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500
msrc
CVE-2021-41378HIGHCVSS 7.82021-11-09
CVE-2021-41378 [HIGH] Windows NTFS Remote Code Execution Vulnerability Windows NTFS Remote Code Execution Vulnerability Windows NTFS: Windows NTFS Microsoft: Microsoft Customer Action Required: Yes Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5007206 Reference: https://support.microsoft.
msrc
CVE-2021-41367HIGHCVSS 7.82021-11-09
CVE-2021-41367 [HIGH] NTFS Elevation of Privilege Vulnerability NTFS Elevation of Privilege Vulnerability Windows NTFS: Windows NTFS Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5007206 Reference: https://support.microsoft.com/help/5007
msrc
CVE-2021-38665HIGHCVSS 7.42021-11-09
CVE-2021-38665 [HIGH] Remote Desktop Protocol Client Information Disclosure Vulnerability Remote Desktop Protocol Client Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap. Windows RDP: Windows RDP Microsoft: Microsoft Customer Action Required: Yes Impact: Information Disclosure Exploit Status: Publicly Disclosed:No;Ex
msrc
CVE-2021-41377HIGHCVSS 7.82021-11-09
CVE-2021-41377 [HIGH] Windows Fast FAT File System Driver Elevation of Privilege Vulnerability Windows Fast FAT File System Driver Elevation of Privilege Vulnerability Windows Fast FAT Driver: Windows Fast FAT Driver Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com
msrc
CVE-2021-42285HIGHCVSS 7.82021-11-09
CVE-2021-42285 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Windows Kernel: Windows Kernel Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5007206 Reference: https://support
msrc
CVE-2021-42275HIGHCVSS 8.82021-11-09
CVE-2021-42275 [HIGH] Microsoft COM for Windows Remote Code Execution Vulnerability Microsoft COM for Windows Remote Code Execution Vulnerability FAQ: How could an attacker exploit this vulnerability? An authorized attacker could exploit this Windows COM vulnerability by sending from a user mode application specially crafted malicious COM traffic directed at the COM Server, which might lead to remote code execution. Windows COM: Windows COM Microsoft: Microsoft Customer Action Required: Yes
msrc
CVE-2021-41366HIGHCVSS 7.82021-11-09
CVE-2021-41366 [HIGH] Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability Windows Cred SSProvider Protocol: Windows Cred SSProvider Protocol Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Le
msrc
CVE-2021-42283HIGHCVSS 8.82021-11-09
CVE-2021-42283 [HIGH] NTFS Elevation of Privilege Vulnerability NTFS Elevation of Privilege Vulnerability Windows NTFS: Windows NTFS Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5007206 Reference: https://support.microsoft.com/help/5007
msrc
CVE-2021-42280MEDIUMCVSS 5.52021-11-09
CVE-2021-42280 [MEDIUM] Windows Feedback Hub Elevation of Privilege Vulnerability Windows Feedback Hub Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents. Windows Feedback Hub: Windows Feedback Hub Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege
msrc
CVE-2021-41371MEDIUMCVSS 4.42021-11-09
CVE-2021-41371 [MEDIUM] Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is read access to Windows RDP client passwords by RDP server administrators. Windows RDP: Windows RDP Microsoft: Microsoft Customer Action Requir
msrc
CVE-2021-41379MEDIUMCVSS 5.5KEV2021-11-09
CVE-2021-41379 [MEDIUM] Windows Installer Elevation of Privilege Vulnerability Windows Installer Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents. Windows Installer: Windows Installer Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit St
msrc