Windows 10 Vulnerabilities

Security vulnerability tracking for Microsoft Windows 10

Last updated: Aug 17, 2020
Total CVEs

16

Critical

2

With Exploits

57

Last 30 Days

0

Vulnerability Timeline

16 vulnerabilities discovered over time for Windows 10

Severity Distribution

Critical2
13%
High40
250%
Medium16
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2020-14855.5

This vulnerability allows an attacker to access sensitive information from a Windows 10 system by connecting a device like a camera or scanner and running a specially designed application. To exploit this, the attacker must already have access to the system and be able to connect their device to it.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14175.5

This vulnerability allows an attacker who has already logged into a Windows 10 system to run malicious code with high-level permissions, potentially letting them install software, access or modify files, or create new user accounts. To exploit it, the attacker needs to run a specially crafted application on the system.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-13835.5

This vulnerability allows an attacker to gather sensitive information from a Windows 10 system that has the Routing and Remote Access feature enabled, potentially leading to further attacks. However, only systems with this feature turned on are at risk, as it is not enabled by default.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-13795.5

An attacker can take control of a victim's computer, allowing them to install programs, change or delete files, or create new user accounts with full access. This vulnerability can be exploited if the victim opens a specially crafted document or visits a malicious website.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2019-11724.3

An attacker can take over a user's account by tricking them into visiting a malicious website that steals their login token. This requires the user to click on a specially crafted link, making it crucial for users to be cautious about where they browse.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11715.6

This vulnerability allows an attacker who has logged into a Windows 10 system to run a specially crafted application that can reveal sensitive information, potentially leading to further attacks on the system. While it doesn't let the attacker execute code or gain higher privileges directly, the leaked information could help them compromise the system in other ways.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11635.5

An attacker can inject malicious code into a signed CAB file without breaking its signature, allowing them to trick a user into running the compromised file. To exploit this, the attacker needs to modify the CAB file and convince the target user to execute it.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11585.5

This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of the device. To exploit it, the attacker might trick the user into opening a malicious document or visiting a harmful website.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11435.5

This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of it. To exploit this, the attacker might trick the user into opening a malicious document or visiting a harmful website.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-10785.5

An attacker can exploit this vulnerability to access sensitive information from a user's system, potentially leading to further attacks. However, they need to be authenticated and must run a specially crafted application on the target machine to take advantage of this flaw.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-07235.8

An attacker with a privileged account on a virtual machine can crash the host server by running a specially crafted application. This vulnerability relies on the attacker already having elevated access within the guest operating system.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-07185.8

An attacker with a privileged account on a virtual machine can crash the host server by running a specially crafted application, causing a denial of service. This vulnerability affects systems using Microsoft Hyper-V Network Switch, and it requires the attacker to already have elevated access within the guest operating system.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-07175.8

An attacker with a privileged account on a virtual machine can crash the host server by running a specially crafted application, leading to a denial of service. This vulnerability specifically affects the Microsoft Hyper-V Network Switch, and it requires the attacker to already have elevated access on the guest operating system.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-07165.8

An attacker can cause a Windows 10 system to freeze and stop responding by logging in and running a specially crafted application. However, they cannot execute malicious code or gain higher privileges through this vulnerability.

microsoftwindows 10
Theoretical
over 6 years agoAug 14, 2019
CVE-2019-07155.8

An attacker with a privileged account on a virtual machine can crash the host server by running a specially crafted application, disrupting services for all users. This vulnerability requires the attacker to already have elevated access within the guest operating system.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-07145.8

An attacker with a privileged account on a virtual machine can crash the host server by running a specially crafted application, leading to a denial of service. This vulnerability requires the attacker to already have elevated access within the guest operating system.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019

About Microsoft Windows 10 Security

This page provides comprehensive security vulnerability tracking for Microsoft Windows 10. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Windows 10 updated to the latest version
  • • Subscribe to security advisories from Microsoft
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately