Microsoft Windows 8.1 vulnerabilities
1,054 known vulnerabilities affecting microsoft/windows_8.1.
Total CVEs
1,054
CISA KEV
40
actively exploited
Public exploits
38
Exploited in wild
49
Severity breakdown
CRITICAL31HIGH764MEDIUM256LOW3
Vulnerabilities
Page 45 of 53
CVE-2020-1488HIGHCVSS 7.8≥ 6.3.0, < publication2020-08-17
CVE-2020-1488 [HIGH] CWE-269 CVE-2020-1488: An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperl
An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.
To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by corr
nvd
CVE-2020-1486HIGHCVSS 7.8≥ 6.3.0, < publication2020-08-17
CVE-2020-1486 [HIGH] CVE-2020-1486: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle obje
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, a
nvd
CVE-2020-1464MEDIUMCVSS 5.5KEV≥ 6.3.0, < publication2020-08-17
CVE-2020-1464 [MEDIUM] CWE-347 CVE-2020-1464: A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who
A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files.
In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded.
The update address
nvd
CVE-2020-1485MEDIUMCVSS 5.5≥ 6.3.0, < publication2020-08-17
CVE-2020-1485 [MEDIUM] CVE-2020-1485: An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service impr
An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit the vulnerability, an authenticated attacker could connect an imaging device (camera,
nvd
CVE-2020-1577MEDIUMCVSS 6.5≥ 6.3.0, < publication2020-08-17
CVE-2020-1577 [MEDIUM] CVE-2020-1577: An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted
nvd
CVE-2020-1487MEDIUMCVSS 6.5≥ 6.3.0, < publication2020-08-17
CVE-2020-1487 [MEDIUM] CVE-2020-1487: An information disclosure vulnerability exists when Media Foundation improperly handles objects in m
An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log onto an affected system and open a specially crafted file. In a web-b
nvd
CVE-2020-1474MEDIUMCVSS 5.5≥ 6.3.0, < publication2020-08-17
CVE-2020-1474 [MEDIUM] CVE-2020-1474: An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service impr
An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit the vulnerability, an authenticated attacker could connect an imaging device (camera,
nvd
CVE-2020-1383MEDIUMCVSS 5.5≥ 6.3.0, < publication2020-08-17
CVE-2020-1383 [MEDIUM] CVE-2020-1383: An information disclosure vulnerability exists in RPC if the server has Routing and Remote Access en
An information disclosure vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system
To exploit this vulnerability, an attacker would need to run a specially crafted application against an RPC server which has Routin
nvd
CVE-2019-1125MEDIUMCVSS 5.6PoC≥ 6.3.0, < publication2019-09-03
CVE-2019-1125 [MEDIUM] CVE-2019-1125: An information disclosure vulnerability exists when certain central processing units (CPU) speculati
An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The v
nvd
CVE-2019-1212CRITICALCVSS 9.8≥ 6.3.0, < publication2019-08-14
CVE-2019-1212 [CRITICAL] CWE-787 CVE-2019-1212: A memory corruption vulnerability exists in the Windows Server DHCP service when processing speciall
A memory corruption vulnerability exists in the Windows Server DHCP service when processing specially crafted packets. An attacker who successfully exploited the vulnerability could cause the DHCP server service to stop responding.
To exploit the vulnerability, a remote unauthenticated attacker could send a specially crafted packet to an affected DH
nvd
CVE-2019-1182CRITICALCVSS 9.8≥ 6.3.0, < publication2019-08-14
CVE-2019-1182 [CRITICAL] CVE-2019-1182: A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability cou
nvd
CVE-2019-0736CRITICALCVSS 9.8≥ 6.3.0, < publication2019-08-14
CVE-2019-0736 [CRITICAL] CWE-787 CVE-2019-0736: A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially
A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine.
To exploit the vulnerability, an attacker could send specially crafted DHCP responses to a client.
The securi
nvd
CVE-2019-1181CRITICALCVSS 9.8≥ 6.3.0, < publication2019-08-14
CVE-2019-1181 [CRITICAL] CVE-2019-1181: A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability cou
nvd
CVE-2019-0720HIGHCVSS 8.0≥ 6.3.0, < publication2019-08-14
CVE-2019-0720 [HIGH] CWE-20 CVE-2019-0720: A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fa
A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to exe
nvd
CVE-2019-1180HIGHCVSS 7.0≥ 6.3.0, < publication2019-08-14
CVE-2019-1180 [HIGH] CVE-2019-1180: An elevation of privilege vulnerability exists in the way that the wcmsvc.dll handles objects in mem
An elevation of privilege vulnerability exists in the way that the wcmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerability b
nvd
CVE-2019-1156HIGHCVSS 7.8≥ 6.3.0, < publication2019-08-14
CVE-2019-1156 [HIGH] CVE-2019-1156: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the vulnerabili
nvd
CVE-2019-1178HIGHCVSS 7.0≥ 6.3.0, < publication2019-08-14
CVE-2019-1178 [HIGH] CVE-2019-1178: An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects in me
An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerability
nvd
CVE-2019-1159HIGHCVSS 7.8≥ 6.3.0, < publication2019-08-14
CVE-2019-1159 [HIGH] CVE-2019-1159: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle obje
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, a
nvd
CVE-2019-1150HIGHCVSS 8.8PoC≥ 6.3.0, < publication2019-08-14
CVE-2019-1150 [HIGH] CWE-787 CVE-2019-1150: A remote code execution vulnerability exists when the Windows font library improperly handles specia
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whos
nvd
CVE-2019-1164HIGHCVSS 7.8≥ 6.3.0, < publication2019-08-14
CVE-2019-1164 [HIGH] CWE-1260 CVE-2019-1164: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle obje
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
nvd