Msrc Windows 10 Version 1909 vulnerabilities
1,250 known vulnerabilities affecting msrc/windows_10_version_1909.
Total CVEs
1,250
CISA KEV
34
actively exploited
Public exploits
20
Exploited in wild
38
Severity breakdown
CRITICAL15HIGH936MEDIUM295LOW4
Vulnerabilities
Page 21 of 63
CVE-2021-33742HIGHCVSS 7.5KEV2021-06-08
CVE-2021-33742 [HIGH] Windows MSHTML Platform Remote Code Execution Vulnerability
Windows MSHTML Platform Remote Code Execution Vulnerability
FAQ: The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2?
While Microsoft has announced retirement of the Internet Explorer 11 applicatio
msrc
CVE-2021-1675HIGHCVSS 7.8KEVPoC2021-06-08
CVE-2021-1675 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Remote Code Execution Vulnerability
FAQ: Is this the vulnerability that has been referred to publicly as PrintNightmare?
No, Microsoft has assigned CVE-2021-34527 to PrintNightmare. CVE-2021-1675 is similar but distinct from CVE-2021-34527.
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:
msrc
CVE-2021-31973HIGHCVSS 7.82021-06-08
CVE-2021-31973 [HIGH] Windows GPSVC Elevation of Privilege Vulnerability
Windows GPSVC Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: https://support.microsoft.com/help
msrc
CVE-2021-31975HIGHCVSS 7.52021-06-08
CVE-2021-31975 [HIGH] Server for NFS Information Disclosure Vulnerability
Server for NFS Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Network File System: Windows Network File System
Microsoft: Microsoft
Im
msrc
CVE-2021-31974HIGHCVSS 7.52021-06-08
CVE-2021-31974 [HIGH] Server for NFS Denial of Service Vulnerability
Server for NFS Denial of Service Vulnerability
Windows Network File System: Windows Network File System
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: https://support.microsoft.c
msrc
CVE-2021-31956HIGHCVSS 7.8KEV2021-06-08
CVE-2021-31956 [HIGH] Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
Additionally, an attacker could convince a local user to open a malicious file. The attacker would ha
msrc
CVE-2021-31976HIGHCVSS 7.52021-06-08
CVE-2021-31976 [HIGH] Server for NFS Information Disclosure Vulnerability
Server for NFS Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Network File System: Windows Network File System
Microsoft: Microsoft
Im
msrc
CVE-2021-31954HIGHCVSS 7.82021-06-08
CVE-2021-31954 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.micr
msrc
CVE-2021-26414MEDIUMCVSS 4.82021-06-08
CVE-2021-26414 [MEDIUM] Windows DCOM Server Security Feature Bypass
Windows DCOM Server Security Feature Bypass
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this specially crafted server share or
msrc
CVE-2021-31971MEDIUMCVSS 6.82021-06-08
CVE-2021-31971 [MEDIUM] Windows HTML Platforms Security Feature Bypass Vulnerability
Windows HTML Platforms Security Feature Bypass Vulnerability
FAQ: The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2?
While Microsoft has announced retirement of the Internet Explorer 11 applic
msrc
CVE-2021-31201MEDIUMCVSS 5.2KEV2021-06-08
CVE-2021-31201 [HIGH] Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
FAQ: Is this CVE related to Adobe CVE-2021-28550?
Yes, Microsoft CVE-2021-31201 and CVE-2021-31199 address vulnerabilities that are related to Adobe's CVE-2021-28550, released in Adobe Security Bulletin ID APSB21-29. Customers running affected versions of Microsoft Windows should install the June security updates to b
msrc
CVE-2021-31970MEDIUMCVSS 5.52021-06-08
CVE-2021-31970 [MEDIUM] Windows TCP/IP Driver Security Feature Bypass Vulnerability
Windows TCP/IP Driver Security Feature Bypass Vulnerability
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Security Feature Bypass
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: https://support.mic
msrc
CVE-2021-31199MEDIUMCVSS 5.2KEV2021-06-08
CVE-2021-31199 [HIGH] Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
FAQ: Is this CVE related to Adobe CVE-2021-28550?
Yes, Microsoft CVE-2021-31201 and CVE-2021-31199 address vulnerabilities that are related to Adobe's CVE-2021-28550, released in Adobe Security Bulletin ID APSB21-29. Customers running affected versions of Microsoft Windows should install the June security updates to b
msrc
CVE-2021-31972MEDIUMCVSS 5.52021-06-08
CVE-2021-31972 [MEDIUM] Event Tracing for Windows Information Disclosure Vulnerability
Event Tracing for Windows Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Windows Event Logging Service: Windows
msrc
CVE-2021-31959MEDIUMCVSS 6.42021-06-08
CVE-2021-31959 [MEDIUM] Scripting Engine Memory Corruption Vulnerability
Scripting Engine Memory Corruption Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-
msrc
CVE-2021-28476CRITICALCVSS 9.92021-05-11
CVE-2021-28476 [CRITICAL] Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
FAQ: Under what circumstances might this vulnerability be exploited other than as a denial of service attack against a Hyper-V host?
This issue allows a guest VM to force the Hyper-V host's kernel to read from an arbitrary, potentially invalid address. The contents of the address read would not be returned to the guest VM. In most circumstances, this would result in
msrc
CVE-2021-31193HIGHCVSS 7.82021-05-11
CVE-2021-31193 [HIGH] Windows SSDP Service Elevation of Privilege Vulnerability
Windows SSDP Service Elevation of Privilege Vulnerability
Windows SSDP Service: Windows SSDP Service
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174
Reference: https://catalo
msrc
CVE-2021-31188HIGHCVSS 7.82021-05-11
CVE-2021-31188 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500317
msrc
CVE-2021-31186HIGHCVSS 7.42021-05-11
CVE-2021-31186 [HIGH] Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
FAQ: How would an attacker exploit this vulnerability?
An attacker would have to convince a targeted user to connect to a ma
msrc
CVE-2021-28455HIGHCVSS 8.82021-05-11
CVE-2021-28455 [HIGH] Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability
Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability
FAQ: Is the Preview Pane an attack vector for this vulnerability?
No, the Preview Pane is not an attack vector.
FAQ: How do the security updates address this vulnerability?
The security updates address the vulnerability by providing the ability to configure the Jet Red Data
msrc