Windows 10 Vulnerabilities

Security vulnerability tracking for Microsoft Windows 10

Last updated: Jul 16, 2021
Total CVEs

58

Critical

2

With Exploits

57

Last 30 Days

0

Vulnerability Timeline

58 vulnerabilities discovered over time for Windows 10

Severity Distribution

Critical2
3%
High40
69%
Medium16
28%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2021-344818.8

This vulnerability allows an attacker to run any code they choose on a Windows 10 machine with full system privileges, meaning they could install software, access or delete files, and create new user accounts. It requires the attacker to exploit the Windows Print Spooler service, which is often running on the system, making it a significant risk if not patched.

microsoftwindows 10
Exploit Available
over 4 years agoJul 16, 2021
CVE-2021-268877.8

This vulnerability allows an attacker to redirect another user's personal data to a folder they control, effectively stealing sensitive information. It requires that folder redirection is enabled through Group Policy and that the attacker has access to the same file server as the targeted user.

microsoftwindows 10
Exploit Available
about 5 years agoMar 11, 2021
CVE-2020-14907.8

This vulnerability allows an attacker to gain higher access rights on a Windows 10 system, potentially letting them control the system or access sensitive data. However, the attacker must first run a malicious application on the victim's computer to exploit this flaw.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14897.8

This vulnerability allows an attacker to gain higher-level access on a Windows 10 system, potentially letting them take control of the machine. However, the attacker must first run a malicious application on the victim's system to exploit this weakness.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14887.0

This vulnerability allows an attacker who is already logged into a Windows 10 system to run a specially crafted application that can gain higher access to system files, potentially letting them modify or delete important data. To exploit this, the attacker must have valid user credentials on the system.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14877.8

This vulnerability allows an attacker to access sensitive information on a user's system, which could lead to further attacks. To exploit it, the attacker needs the user to open a specially crafted file, often by tricking them into clicking a link in an email or message.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14867.8

This vulnerability allows an attacker who has logged into a Windows 10 system to run malicious code with full control over the system, enabling them to install programs, access or delete files, and create new user accounts. To exploit it, the attacker must first be logged on and then run a specially crafted application.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14855.5

This vulnerability allows an attacker to access sensitive information from a Windows 10 system by connecting a device like a camera or scanner and running a specially designed application. To exploit this, the attacker must already have access to the system and be able to connect their device to it.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14847.8

This vulnerability allows an attacker to gain higher access rights on a Windows 10 system, enabling them to perform actions they normally wouldn't be able to. However, the attacker must first run a malicious program on the victim's computer to exploit this weakness.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14807.8

This vulnerability allows an attacker to gain full control over a Windows 10 system, enabling them to install software, access or delete files, and create new user accounts with complete rights. However, the attacker must first log into the system and run a specially crafted application to exploit the flaw.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14797.8

This vulnerability allows an attacker to gain full control of a Windows 10 system, enabling them to install programs, alter or delete files, and create new user accounts with complete access. However, the attacker must first log in to the system and then run a specially crafted application to exploit the flaw.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14787.8

This vulnerability allows an attacker to take control of a user's system, enabling them to install programs, access or delete files, and create new accounts with full rights. To exploit it, the attacker typically needs to trick the user into opening a malicious document or visiting a harmful website.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14777.0

An attacker can take control of a victim's computer by exploiting a flaw in Windows Media Foundation, allowing them to install programs, access or delete files, and create new user accounts. This usually requires the victim to open a specially crafted document or visit a malicious website.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14757.8

This vulnerability allows an attacker who has already logged into a Windows 10 system to run malicious code with higher permissions than they should have. To exploit it, the attacker needs to execute a specially crafted application on the system.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14747.8

This vulnerability allows an attacker to access sensitive information from a Windows 10 system by connecting a device like a camera or scanner and running a specially designed application. To exploit it, the attacker must already have access to the system and be able to connect their imaging device.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14737.0

An attacker can take control of a victim's computer by tricking them into opening a specially crafted file, which allows the attacker to run any code they want on that system. This vulnerability specifically affects Windows 10 and relies on the victim's action of opening the malicious file.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14707.8

This vulnerability allows an attacker to gain higher access rights on a Windows 10 system, potentially letting them control the system more fully. However, the attacker must first run a malicious application on the victim's machine to exploit this weakness.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-146710.0

This vulnerability allows an attacker to gain elevated privileges on a Windows 10 system, potentially giving them control over important files. However, the attacker must first log in to the system and run a specially designed application to exploit this weakness.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14597.5

This vulnerability allows an attacker with local access to a Windows 10 device to potentially steal sensitive information by exploiting how the system processes instructions. To take advantage of this flaw, the attacker must run a specially crafted application on the device.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
CVE-2020-14175.5

This vulnerability allows an attacker who has already logged into a Windows 10 system to run malicious code with high-level permissions, potentially letting them install software, access or modify files, or create new user accounts. To exploit it, the attacker needs to run a specially crafted application on the system.

microsoftwindows 10
Exploit Available
over 5 years agoAug 17, 2020
Showing 1 to 20 of 58 results

About Microsoft Windows 10 Security

This page provides comprehensive security vulnerability tracking for Microsoft Windows 10. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Windows 10 updated to the latest version
  • • Subscribe to security advisories from Microsoft
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately