Microsoft Vulnerabilities
Comprehensive security vulnerability database for Microsoft products
101
3
94
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2019-1168 | 7.8 | This vulnerability allows an attacker who has already logged into a Windows 10 system to run malicious code with higher privileges, potentially taking full control of the machine. To exploit it, the attacker needs to use a specially crafted application targeting a specific service on the system. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1164 | 7.8 | This vulnerability allows an attacker to gain full control of a Windows 10 system, enabling them to install programs, change or delete data, and create new user accounts. However, the attacker must first log in to the system and then run a specially designed application to exploit this weakness. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1163 | 5.5 | An attacker can inject malicious code into a signed CAB file without breaking its signature, allowing them to trick a user into running the compromised file. To exploit this, the attacker needs to modify the CAB file and convince the target user to execute it. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1162 | 7.8 | This vulnerability allows an attacker to gain full control of a Windows 10 system, enabling them to install programs, access or delete files, and create new user accounts. However, the attacker must first log in to the system and run a specially crafted application to exploit this weakness. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1161 | 7.1 | This vulnerability allows an attacker who has logged into a Windows system to delete important files by tricking the system's Defender component into running a harmful command. To exploit this, the attacker needs to be logged in, making it a risk primarily for systems where unauthorized users can gain access. | microsoftwindows defender | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1159 | 7.8 | This vulnerability allows an attacker who has already logged into a Windows 10 system to run malicious code with full control over the operating system, enabling them to install software, access or delete files, and create new user accounts. To exploit it, the attacker must run a specially crafted application on the affected system. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1158 | 5.5 | This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of the device. To exploit it, the attacker might trick the user into opening a malicious document or visiting a harmful website. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1157 | 7.8 | An attacker can run any code they want on a victim's computer by getting them to open a specially crafted file. This vulnerability affects Windows 10 and requires the victim to interact with the malicious file for the attack to succeed. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1156 | 7.8 | An attacker can run any code they choose on a victim's computer if they can get the victim to open a specially crafted file. This vulnerability affects Windows 10 and requires the victim to interact with the malicious file for the attack to succeed. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1155 | 7.8 | An attacker can run any code they choose on a victim's computer by tricking them into opening a specially crafted file. This vulnerability affects Microsoft Office products that use the Windows Jet Database Engine, making it crucial for users to avoid suspicious files to stay safe. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1154 | 5.5 | An attacker can exploit this vulnerability to access sensitive information from a user's system, which could help them take further control over it. To do this, the attacker might trick the user into opening a malicious document or visiting a harmful website. | microsoftwindows 7 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1153 | 5.5 | This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of it. However, the attacker must first log on to the affected system and run a specially crafted application to exploit this weakness. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1152 | 8.8 | This vulnerability allows an attacker to take control of a Windows 10 system by exploiting flaws in how the operating system handles certain fonts, which could let them install programs or access sensitive data. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1151 | 8.8 | This vulnerability allows an attacker to take control of a system by exploiting flaws in how Windows handles certain fonts, which could let them install programs or access sensitive data. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1150 | 8.8 | This vulnerability allows an attacker to take control of a Windows 10 system by exploiting flaws in how the operating system handles certain fonts, enabling them to install programs, access data, or create new user accounts. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document file. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1149 | 8.8 | This vulnerability allows an attacker to take control of a system by exploiting a flaw in how Windows handles certain fonts, which could lead to installing malicious software or accessing sensitive data. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1148 | 5.5 | This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of the system. To exploit it, the attacker must first log on to the affected system and run a specially crafted application. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1147 | 7.8 | An attacker can take control of a victim's computer by tricking them into opening a specially crafted file, which allows the attacker to run harmful code on the system. This vulnerability affects Windows 10 and requires the victim to interact with the malicious file for the attack to succeed. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1146 | 7.8 | An attacker can run any code they want on a victim's computer if they can trick the victim into opening a specially crafted file. This vulnerability affects Windows 10 and requires the victim to interact with the malicious file for the attack to succeed. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1145 | 8.8 | An attacker can take control of a Windows 10 system by exploiting a flaw in how the operating system handles certain fonts, allowing them to install programs, access or delete data, and create new user accounts. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
About Microsoft Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Microsoft products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.