Windows 10 1803 Microsoft Windows 10 1803

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Microsoft Windows 10 1803.

By the Year

In 2025 there have been 0 vulnerabilities in Microsoft Windows 10 1803. Windows 10 1803 did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2025 0 0.00
2024 0 0.00
2023 1 7.80
2022 0 0.00
2021 2 7.80
2020 2 7.80
2019 4 7.80
2018 3 8.03

It may take a day or so for new Windows 10 1803 vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Microsoft Windows 10 1803 Security Vulnerabilities

HP Factory Preinstalled Images on certain systems

CVE-2022-38396 7.8 - High - February 12, 2023

HP Factory Preinstalled Images on certain systems that shipped with Windows 10 versions 20H2 and earlier OS versions might allow escalation of privilege via execution of certain files outside the restricted path. This potential vulnerability was remediated starting with Windows 10 versions 21H2 on October 31, 2021.

Win32k Elevation of Privilege Vulnerability

CVE-2021-28310 7.8 - High - April 13, 2021

Win32k Elevation of Privilege Vulnerability

Memory Corruption

Windows Win32k Elevation of Privilege Vulnerability

CVE-2021-1732 7.8 - High - February 25, 2021

Windows Win32k Elevation of Privilege Vulnerability

Memory Corruption

A spoofing vulnerability exists when Windows incorrectly validates file signatures

CVE-2020-1464 7.8 - High - August 17, 2020

A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded. The update addresses the vulnerability by correcting how Windows validates file signatures.

Improper Verification of Cryptographic Signature

An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links

CVE-2020-0787 7.8 - High - March 12, 2020

An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.

insecure temporary file

An elevation of privilege vulnerability exists when Windows improperly handles authentication requests

CVE-2019-1322 7.8 - High - October 10, 2019

An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1320, CVE-2019-1340.

An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker

CVE-2019-1253 7.8 - High - September 11, 2019

An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303.

An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations

CVE-2019-1069 7.8 - High - June 12, 2019

An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations, aka 'Task Scheduler Elevation of Privilege Vulnerability'.

insecure temporary file

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links

CVE-2019-0841 7.8 - High - April 09, 2019

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836.

insecure temporary file

An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles fragmented IP packets

CVE-2018-8493 7.5 - High - October 10, 2018

An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles fragmented IP packets, aka "Windows TCP/IP Information Disclosure Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory

CVE-2018-8453 7.8 - High - October 10, 2018

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects

CVE-2018-0824 8.8 - High - May 09, 2018

A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

Marshaling, Unmarshaling

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Microsoft Windows Server 1709 or by Microsoft? Click the Watch button to subscribe.

Microsoft
Vendor

subscribe