Metrics
Affected Vendors & Products
Wed, 22 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Tue, 20 May 2025 18:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. | An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links. | 
| Title | Windows Elevation of Privilege Vulnerability | |
| References |  | |
| Metrics | cvssV3_1 
 | cvssV3_1 
 | 
Thu, 03 Apr 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Microsoft windows 10 1607 Microsoft windows 10 1703 Microsoft windows 10 1709 Microsoft windows 10 1803 Microsoft windows 10 1809 Microsoft windows 10 1903 Microsoft windows Server 1709 Microsoft windows Server 1803 Microsoft windows Server 1903 | |
| CPEs | cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:* | cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:* | 
| Vendors & Products | Microsoft windows 10 | Microsoft windows 10 1607 Microsoft windows 10 1703 Microsoft windows 10 1709 Microsoft windows 10 1803 Microsoft windows 10 1809 Microsoft windows 10 1903 Microsoft windows Server 1709 Microsoft windows Server 1803 Microsoft windows Server 1903 | 
| Metrics | cvssV3_0 
 | 
Fri, 07 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | cvssV3_1 
 
 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: microsoft
Published: 2019-06-12T13:49:41.000Z
Updated: 2025-10-21T23:45:34.956Z
Reserved: 2018-11-26T00:00:00.000Z
Link: CVE-2019-1064
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-04T18:06:31.506Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2019-06-12T14:29:04.273
Modified: 2025-10-29T14:39:22.793
Link: CVE-2019-1064
 Redhat
                        Redhat
                    No data.