Msrc Windows Server Version 1803 vulnerabilities
568 known vulnerabilities affecting msrc/windows_server_version_1803.
Total CVEs
568
CISA KEV
22
actively exploited
Public exploits
44
Exploited in wild
25
Severity breakdown
CRITICAL12HIGH376MEDIUM174LOW6
Vulnerabilities
Page 13 of 29
CVE-2019-1424HIGHCVSS 8.12019-11-12
CVE-2019-1424 [HIGH] NetLogon Security Feature Bypass Vulnerability
NetLogon Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists when Windows Netlogon improperly handles a secure communications channel. An attacker who successfully exploited the vulnerability could downgrade aspects of the connection allowing for further modification of the transmission.
To exploit the vulnerability, an attacker would require an active man in the middle attack to be
msrc
CVE-2019-1417HIGHCVSS 7.82019-11-12
CVE-2019-1417 [HIGH] Windows Data Sharing Service Elevation of Privilege Vulnerability
Windows Data Sharing Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
msrc
CVE-2019-1420HIGHCVSS 7.82019-11-12
CVE-2019-1420 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the dssvc.dll handles file creation allowing for a file overwrite or creation in a secured location. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
Th
msrc
CVE-2019-1385HIGHCVSS 7.8KEVPoC2019-11-12
CVE-2019-1385 [HIGH] Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.
To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.
The security update a
msrc
CVE-2019-1438HIGHCVSS 7.02019-11-12
CVE-2019-1438 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2019-1422HIGHCVSS 7.82019-11-12
CVE-2019-1422 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the iphlpsvc.dll handles file creation allowing for a file overwrite. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the
msrc
CVE-2019-1397HIGHCVSS 7.62019-11-12
CVE-2019-1397 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.
msrc
CVE-2019-1419HIGHCVSS 7.82019-11-12
CVE-2019-1419 [HIGH] OpenType Font Parsing Remote Code Execution Vulnerability
OpenType Font Parsing Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully expl
msrc
CVE-2019-0719HIGHCVSS 8.02019-11-12
CVE-2019-0719 [CRITICAL] Hyper-V Remote Code Execution Vulnerability
Hyper-V Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary co
msrc
CVE-2019-1405HIGHCVSS 7.8KEVPoC2019-11-12
CVE-2019-1405 [HIGH] Windows UPnP Service Elevation of Privilege Vulnerability
Windows UPnP Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accoun
msrc
CVE-2019-1456HIGHCVSS 7.82019-11-12
CVE-2019-1456 [HIGH] OpenType Font Parsing Remote Code Execution Vulnerability
OpenType Font Parsing Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully expl
msrc
CVE-2019-1398HIGHCVSS 7.62019-11-12
CVE-2019-1398 [HIGH] Windows Hyper-V Remote Code Execution Vulnerability
Windows Hyper-V Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.
msrc
CVE-2019-1380HIGHCVSS 7.82019-11-12
CVE-2019-1380 [HIGH] Microsoft splwow64 Elevation of Privilege Vulnerability
Microsoft splwow64 Elevation of Privilege Vulnerability
Description: A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.
This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be
msrc
CVE-2019-1416HIGHCVSS 7.82019-11-12
CVE-2019-1416 [HIGH] Windows Subsystem for Linux Elevation of Privilege Vulnerability
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists due to a race condition in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update add
msrc
CVE-2019-1407HIGHCVSS 7.82019-11-12
CVE-2019-1407 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2019-1435HIGHCVSS 7.02019-11-12
CVE-2019-1435 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2019-1408HIGHCVSS 7.82019-11-12
CVE-2019-1408 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2019-11135MEDIUMCVSS 4.72019-11-12
CVE-2019-11135 [MEDIUM] Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application
msrc
CVE-2019-1436MEDIUMCVSS 5.52019-11-12
CVE-2019-1436 [MEDIUM] Win32k Information Disclosure Vulnerability
Win32k Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
The security
msrc
CVE-2019-1381MEDIUMCVSS 6.62019-11-12
CVE-2019-1381 [MEDIUM] Microsoft Windows Information Disclosure Vulnerability
Microsoft Windows Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows Servicing Stack allows access to unprivileged file locations. An attacker who successfully exploited the vulnerability could potentially access unauthorized files.
To exploit this vulnerability, an authenticated attacker could run a specially crafted application in user mode.
The update a
msrc