Msrc Windows 8.1 vulnerabilities

1,848 known vulnerabilities affecting msrc/windows_8.1.

Total CVEs
1,848
CISA KEV
80
actively exploited
Public exploits
162
Exploited in wild
91
Severity breakdown
CRITICAL29HIGH1242MEDIUM556LOW21

Vulnerabilities

Page 11 of 93
CVE-2022-34691HIGHCVSS 8.82022-08-09
CVE-2022-34691 [HIGH] Active Directory Domain Services Elevation of Privilege Vulnerability Active Directory Domain Services Elevation of Privilege Vulnerability FAQ: How could an attacker exploit this vulnerability? An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow elevation of privilege to System. FAQ: Where can I find out more information about this vulnerability? P
msrc
CVE-2022-35820HIGHCVSS 7.82022-08-09
CVE-2022-35820 [HIGH] Windows Bluetooth Driver Elevation of Privilege Vulnerability Windows Bluetooth Driver Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An authorized local attacker could exploit this Windows Bluetooth driver vulnerability by programmatically running certain functions to arbitrarily gain registry key creation and deletion in the bthport.sys driver. Microsoft Bluetooth Driver: Microsoft B
msrc
CVE-2022-34714HIGHCVSS 8.12022-08-09
CVE-2022-34714 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: How could an attacker exploit this vulnerability? An unauthenticated attacker could send a spe
msrc
CVE-2022-35753HIGHCVSS 8.12022-08-09
CVE-2022-35753 [HIGH] Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: How could an attacker exploit this vulnerability? The vulnerable system can be exploited witho
msrc
CVE-2022-35758MEDIUMCVSS 5.52022-08-09
CVE-2022-35758 [MEDIUM] Windows Kernel Memory Information Disclosure Vulnerability Windows Kernel Memory Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Kernel: Windows Kernel Microsoft: Microsoft Customer Act
msrc
CVE-2022-35754MEDIUMCVSS 6.72022-08-09
CVE-2022-35754 [MEDIUM] Unified Write Filter Elevation of Privilege Vulnerability Unified Write Filter Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Unified Write Filter: Windows Unified Write Filter Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly D
msrc
CVE-2022-35747MEDIUMCVSS 5.92022-08-09
CVE-2022-35747 [MEDIUM] Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability FAQ: How could an attacker exploit this vulnerability? An unauthenticated attacker could send a specially crafted connection request to a RAS server, which could lead to denial of service (DOS) on the RAS server machine. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerabili
msrc
CVE-2022-35759MEDIUMCVSS 6.52022-08-09
CVE-2022-35759 [MEDIUM] Windows Local Security Authority (LSA) Denial of Service Vulnerability Windows Local Security Authority (LSA) Denial of Service Vulnerability Windows Local Security Authority (LSA): Windows Local Security Authority (LSA) Microsoft: Microsoft Customer Action Required: Yes Impact: Denial of Service Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https
msrc
CVE-2022-34708MEDIUMCVSS 5.52022-08-09
CVE-2022-34708 [MEDIUM] Windows Kernel Information Disclosure Vulnerability Windows Kernel Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Windows Kernel: Windows Kernel Microsoft: Microsoft Customer Action Required:
msrc
CVE-2022-22024HIGHCVSS 7.82022-07-12
CVE-2022-22024 [HIGH] Windows Fax Service Remote Code Execution Vulnerability Windows Fax Service Remote Code Execution Vulnerability FAQ: In what scenarios is my computer vulnerable? For Windows 11 and Windows 10 the FAX service is not installed by default. For the vulnerability to be exploitable, the Windows Fax and Scan feature needs to be enabled, and the Fax service needs to be running. Systems that do not have the Fax service running are not vulnerable. How can I verify whether the Fax se
msrc
CVE-2022-22026HIGHCVSS 8.82022-07-12
CVE-2022-22026 [HIGH] Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? A locally authenticated attacker could send specially crafted data to the local CSRSS service to elevate their privileges from AppContainer to SYSTEM. Because the A
msrc
CVE-2022-30221HIGHCVSS 8.82022-07-12
CVE-2022-30221 [HIGH] Windows Graphics Component Remote Code Execution Vulnerability Windows Graphics Component Remote Code Execution Vulnerability FAQ: How would an attacker exploit this vulnerability? An attacker would have to convince a targeted user to connect to a malicious RDP server. Upon connecting, the malicious server could execute code on the victim's system in the context of the targeted user. FAQ: I am running Windows 7 Service Pack 1 or Windows Server 2008 R2 Service Pack 1. Is t
msrc
CVE-2022-22022HIGHCVSS 7.12022-07-12
CVE-2022-22022 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability Windows Print Spooler Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents. Windows Print Spooler Components: Windows Print Spooler Components Microsoft: Microsoft Customer Action Required: Yes Impact
msrc
CVE-2022-22049HIGHCVSS 7.82022-07-12
CVE-2022-22049 [HIGH] Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Client/Server Runtime Subsystem: Windows Client/Server Runtime Subsystem Microsoft: Microsoft Customer Acti
msrc
CVE-2022-22047HIGHCVSS 7.8KEV2022-07-12
CVE-2022-22047 [HIGH] Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Client/Server Runtime Subsystem: Windows Client/Server Runtime Subsystem Microsoft: Microsoft Customer Acti
msrc
CVE-2022-22027HIGHCVSS 7.82022-07-12
CVE-2022-22027 [HIGH] Windows Fax Service Remote Code Execution Vulnerability Windows Fax Service Remote Code Execution Vulnerability FAQ: In what scenarios is my computer vulnerable? For Windows 11 and Windows 10 the FAX service is not installed by default. For the vulnerability to be exploitable, the Windows Fax and Scan feature needs to be enabled, and the Fax service needs to be running. Systems that do not have the Fax service running are not vulnerable. How can I verify whether the Fax se
msrc
CVE-2022-30225HIGHCVSS 7.12022-07-12
CVE-2022-30225 [HIGH] Windows Media Player Network Sharing Service Elevation of Privilege Vulnerability Windows Media Player Network Sharing Service Elevation of Privilege Vulnerability FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could affect t
msrc
CVE-2022-30224HIGHCVSS 7.02022-07-12
CVE-2022-30224 [HIGH] Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An a
msrc
CVE-2022-22038HIGHCVSS 8.12022-07-12
CVE-2022-22038 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data. Windows Remote Procedure Call Runtime: Windows Remote Procedure
msrc
CVE-2022-22050HIGHCVSS 7.82022-07-12
CVE-2022-22050 [HIGH] Windows Fax Service Elevation of Privilege Vulnerability Windows Fax Service Elevation of Privilege Vulnerability FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Fax and Scan Service: Windows Fax and Scan Service Microsoft: Microsoft Customer Action Required: Yes Impact: Elevation of Privilege Exploit Status: Publicly Discl
msrc