58
2
57
0
Vulnerability Timeline
58 vulnerabilities discovered over time for Windows 10
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2019-1152 | 8.8 | This vulnerability allows an attacker to take control of a Windows 10 system by exploiting flaws in how the operating system handles certain fonts, which could let them install programs or access sensitive data. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1150 | 8.8 | This vulnerability allows an attacker to take control of a Windows 10 system by exploiting flaws in how the operating system handles certain fonts, enabling them to install programs, access data, or create new user accounts. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document file. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1147 | 7.8 | An attacker can take control of a victim's computer by tricking them into opening a specially crafted file, which allows the attacker to run harmful code on the system. This vulnerability affects Windows 10 and requires the victim to interact with the malicious file for the attack to succeed. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1146 | 7.8 | An attacker can run any code they want on a victim's computer if they can trick the victim into opening a specially crafted file. This vulnerability affects Windows 10 and requires the victim to interact with the malicious file for the attack to succeed. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1145 | 8.8 | An attacker can take control of a Windows 10 system by exploiting a flaw in how the operating system handles certain fonts, allowing them to install programs, access or delete data, and create new user accounts. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1144 | 8.8 | This vulnerability allows an attacker to take control of a Windows 10 system by exploiting flaws in how the operating system handles certain fonts, enabling them to install programs, access or delete data, and create new user accounts. To exploit this, the attacker must trick users into visiting a malicious website or opening a specially crafted document file. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1143 | 5.5 | This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of it. To exploit this, the attacker might trick the user into opening a malicious document or visiting a harmful website. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1078 | 5.5 | An attacker can exploit this vulnerability to access sensitive information from a user's system, potentially leading to further attacks. However, they need to be authenticated and must run a specially crafted application on the target machine to take advantage of this flaw. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1057 | 7.5 | This vulnerability allows an attacker to run malicious code on a user's system, potentially taking full control of it. To exploit this, the attacker needs to trick the user into clicking a link to a specially crafted website that uses Internet Explorer to process harmful XML content. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-0965 | 7.6 | An attacker can run malicious code on the main server hosting Hyper-V by tricking it through a specially crafted application on a guest operating system. This requires the attacker to have access to that guest operating system, making it crucial for organizations to secure their virtual environments. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-0736 | 9.8 | An attacker can take control of a Windows 10 machine by sending specially crafted DHCP responses to it, allowing them to run any code they choose. This requires the attacker to be on the same network as the target device, making it crucial to secure your network from unauthorized access. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-0723 | 5.8 | An attacker with a privileged account on a virtual machine can crash the host server by running a specially crafted application. This vulnerability relies on the attacker already having elevated access within the guest operating system. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-0720 | 8.0 | This vulnerability allows an attacker to run malicious code on the host operating system from a guest virtual machine, potentially giving them control over the entire server. To exploit this, the attacker must have access to the guest operating system, meaning they need to be able to run applications there. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-0718 | 5.8 | An attacker with a privileged account on a virtual machine can crash the host server by running a specially crafted application, causing a denial of service. This vulnerability affects systems using Microsoft Hyper-V Network Switch, and it requires the attacker to already have elevated access within the guest operating system. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-0717 | 5.8 | An attacker with a privileged account on a virtual machine can crash the host server by running a specially crafted application, leading to a denial of service. This vulnerability specifically affects the Microsoft Hyper-V Network Switch, and it requires the attacker to already have elevated access on the guest operating system. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-0716 | 5.8 | An attacker can cause a Windows 10 system to freeze and stop responding by logging in and running a specially crafted application. However, they cannot execute malicious code or gain higher privileges through this vulnerability. | microsoftwindows 10 | Theoretical | over 6 years agoAug 14, 2019 |
| CVE-2019-0715 | 5.8 | An attacker with a privileged account on a virtual machine can crash the host server by running a specially crafted application, disrupting services for all users. This vulnerability requires the attacker to already have elevated access within the guest operating system. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-0714 | 5.8 | An attacker with a privileged account on a virtual machine can crash the host server by running a specially crafted application, leading to a denial of service. This vulnerability requires the attacker to already have elevated access within the guest operating system. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
About Microsoft Windows 10 Security
This page provides comprehensive security vulnerability tracking for Microsoft Windows 10. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Windows 10 updated to the latest version
- • Subscribe to security advisories from Microsoft
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately