Windows 10 Vulnerabilities

Security vulnerability tracking for Microsoft Windows 10

Last updated: Aug 17, 2020
Total CVEs

58

Critical

2

With Exploits

57

Last 30 Days

0

Vulnerability Timeline

58 vulnerabilities discovered over time for Windows 10

Severity Distribution

Critical2
3%
High40
69%
Medium16
28%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2020-13835.5

This vulnerability allows an attacker to gather sensitive information from a Windows 10 system that has the Routing and Remote Access feature enabled, potentially leading to further attacks. However, only systems with this feature turned on are at risk, as it is not enabled by default.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-13795.5

An attacker can take control of a victim's computer, allowing them to install programs, change or delete files, or create new user accounts with full access. This vulnerability can be exploited if the victim opens a specially crafted document or visits a malicious website.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-13787.5

This vulnerability allows an attacker who is already logged into a Windows 10 system to run a specially crafted application that can give them higher privileges, letting them access sensitive data or control the system. To exploit this flaw, the attacker must have local access to the machine, meaning they need to be physically present or have valid login credentials.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-13777.8

This vulnerability allows an attacker who is already logged into a Windows 10 system to gain higher privileges, potentially letting them take control of the system or access sensitive data. To exploit this, the attacker needs to run a specially crafted application on the targeted machine.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-13397.8

This vulnerability allows an attacker to take control of a Windows 10 system by tricking a user into opening a malicious document or visiting a harmful website. It relies on the Windows Media Audio Codec mishandling certain objects, which can lead to remote code execution if successfully exploited.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-13377.8

This vulnerability allows an attacker to gain full control over a Windows 10 system, enabling them to install programs, delete data, or create new user accounts with full rights. However, the attacker must first log in to the affected system and run a specially crafted script or application to exploit it.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-13367.8

This vulnerability allows an attacker with local access to a Windows 10 machine to run malicious code with higher permissions, potentially giving them control over the system. To exploit it, the attacker must first be logged into the system and run a specially crafted application.

microsoftwindows 10
Exploit Available
over 5 years agoJul 14, 2020
CVE-2019-11747.0

This vulnerability allows an attacker with local access to a Windows 10 system to run malicious code with higher permissions than they should have. To exploit it, the attacker needs to be logged into the system and run a specially crafted application.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11737.0

An attacker can gain higher-level permissions on a Windows 10 system, allowing them to execute malicious code. To exploit this vulnerability, the attacker must already have access to the system and run a specially crafted application.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11724.3

An attacker can take over a user's account by tricking them into visiting a malicious website that steals their login token. This requires the user to click on a specially crafted link, making it crucial for users to be cautious about where they browse.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11715.6

This vulnerability allows an attacker who has logged into a Windows 10 system to run a specially crafted application that can reveal sensitive information, potentially leading to further attacks on the system. While it doesn't let the attacker execute code or gain higher privileges directly, the leaked information could help them compromise the system in other ways.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11707.9

This vulnerability allows an attacker to escape from a restricted environment (sandbox) and gain higher privileges on a Windows 10 system, potentially taking full control. To exploit it, the attacker must first log into the system and run a specially crafted application.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11687.8

This vulnerability allows an attacker who has already logged into a Windows 10 system to run malicious code with higher privileges, potentially taking full control of the machine. To exploit it, the attacker needs to use a specially crafted application targeting a specific service on the system.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11647.8

This vulnerability allows an attacker to gain full control of a Windows 10 system, enabling them to install programs, change or delete data, and create new user accounts. However, the attacker must first log in to the system and then run a specially designed application to exploit this weakness.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11635.5

An attacker can inject malicious code into a signed CAB file without breaking its signature, allowing them to trick a user into running the compromised file. To exploit this, the attacker needs to modify the CAB file and convince the target user to execute it.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11627.8

This vulnerability allows an attacker to gain full control of a Windows 10 system, enabling them to install programs, access or delete files, and create new user accounts. However, the attacker must first log in to the system and run a specially crafted application to exploit this weakness.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11597.8

This vulnerability allows an attacker who has already logged into a Windows 10 system to run malicious code with full control over the operating system, enabling them to install software, access or delete files, and create new user accounts. To exploit it, the attacker must run a specially crafted application on the affected system.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11585.5

This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of the device. To exploit it, the attacker might trick the user into opening a malicious document or visiting a harmful website.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11577.8

An attacker can run any code they want on a victim's computer by getting them to open a specially crafted file. This vulnerability affects Windows 10 and requires the victim to interact with the malicious file for the attack to succeed.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11567.8

An attacker can run any code they choose on a victim's computer if they can get the victim to open a specially crafted file. This vulnerability affects Windows 10 and requires the victim to interact with the malicious file for the attack to succeed.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
Showing 21 to 40 of 58 results

About Microsoft Windows 10 Security

This page provides comprehensive security vulnerability tracking for Microsoft Windows 10. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Windows 10 updated to the latest version
  • • Subscribe to security advisories from Microsoft
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately