Msrc Windows 8.1 vulnerabilities

1,848 known vulnerabilities affecting msrc/windows_8.1.

Total CVEs
1,848
CISA KEV
80
actively exploited
Public exploits
162
Exploited in wild
91
Severity breakdown
CRITICAL29HIGH1242MEDIUM556LOW21

Vulnerabilities

Page 30 of 93
CVE-2021-26414MEDIUMCVSS 4.82021-06-08
CVE-2021-26414 [MEDIUM] Windows DCOM Server Security Feature Bypass Windows DCOM Server Security Feature Bypass FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this specially crafted server share or
msrc
CVE-2021-31971MEDIUMCVSS 6.82021-06-08
CVE-2021-31971 [MEDIUM] Windows HTML Platforms Security Feature Bypass Vulnerability Windows HTML Platforms Security Feature Bypass Vulnerability FAQ: The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 applic
msrc
CVE-2021-31201MEDIUMCVSS 5.2KEV2021-06-08
CVE-2021-31201 [HIGH] Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability FAQ: Is this CVE related to Adobe CVE-2021-28550? Yes, Microsoft CVE-2021-31201 and CVE-2021-31199 address vulnerabilities that are related to Adobe's CVE-2021-28550, released in Adobe Security Bulletin ID APSB21-29. Customers running affected versions of Microsoft Windows should install the June security updates to b
msrc
CVE-2021-31970MEDIUMCVSS 5.52021-06-08
CVE-2021-31970 [MEDIUM] Windows TCP/IP Driver Security Feature Bypass Vulnerability Windows TCP/IP Driver Security Feature Bypass Vulnerability Windows TCP/IP: Windows TCP/IP Microsoft: Microsoft Impact: Security Feature Bypass Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646 Reference: https://support.mic
msrc
CVE-2021-31199MEDIUMCVSS 5.2KEV2021-06-08
CVE-2021-31199 [HIGH] Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability FAQ: Is this CVE related to Adobe CVE-2021-28550? Yes, Microsoft CVE-2021-31201 and CVE-2021-31199 address vulnerabilities that are related to Adobe's CVE-2021-28550, released in Adobe Security Bulletin ID APSB21-29. Customers running affected versions of Microsoft Windows should install the June security updates to b
msrc
CVE-2021-31972MEDIUMCVSS 5.52021-06-08
CVE-2021-31972 [MEDIUM] Event Tracing for Windows Information Disclosure Vulnerability Event Tracing for Windows Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Windows Event Logging Service: Windows
msrc
CVE-2021-31959MEDIUMCVSS 6.42021-06-08
CVE-2021-31959 [MEDIUM] Scripting Engine Memory Corruption Vulnerability Scripting Engine Memory Corruption Vulnerability FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-
msrc
CVE-2021-28476CRITICALCVSS 9.92021-05-11
CVE-2021-28476 [CRITICAL] Windows Hyper-V Remote Code Execution Vulnerability Windows Hyper-V Remote Code Execution Vulnerability FAQ: Under what circumstances might this vulnerability be exploited other than as a denial of service attack against a Hyper-V host? This issue allows a guest VM to force the Hyper-V host's kernel to read from an arbitrary, potentially invalid address. The contents of the address read would not be returned to the guest VM. In most circumstances, this would result in
msrc
CVE-2021-31193HIGHCVSS 7.82021-05-11
CVE-2021-31193 [HIGH] Windows SSDP Service Elevation of Privilege Vulnerability Windows SSDP Service Elevation of Privilege Vulnerability Windows SSDP Service: Windows SSDP Service Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174 Reference: https://catalo
msrc
CVE-2021-31188HIGHCVSS 7.82021-05-11
CVE-2021-31188 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability Microsoft Graphics Component: Microsoft Graphics Component Microsoft: Microsoft Impact: Elevation of Privilege Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB500317
msrc
CVE-2021-31186HIGHCVSS 7.42021-05-11
CVE-2021-31186 [HIGH] Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. FAQ: How would an attacker exploit this vulnerability? An attacker would have to convince a targeted user to connect to a ma
msrc
CVE-2021-28455HIGHCVSS 8.82021-05-11
CVE-2021-28455 [HIGH] Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. FAQ: How do the security updates address this vulnerability? The security updates address the vulnerability by providing the ability to configure the Jet Red Data
msrc
CVE-2021-31194HIGHCVSS 8.82021-05-11
CVE-2021-31194 [HIGH] OLE Automation Remote Code Execution Vulnerability OLE Automation Remote Code Execution Vulnerability Windows OLE: Windows OLE Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174 Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2021-31182HIGHCVSS 7.12021-05-11
CVE-2021-31182 [HIGH] Microsoft Bluetooth Driver Spoofing Vulnerability Microsoft Bluetooth Driver Spoofing Vulnerability Microsoft Bluetooth Driver: Microsoft Bluetooth Driver Microsoft: Microsoft Impact: Spoofing Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174 Reference: https://catalog.update.microsoft
msrc
CVE-2020-24587MEDIUMCVSS 6.52021-05-11
CVE-2020-24587 [LOW] Windows Wireless Networking Information Disclosure Vulnerability Windows Wireless Networking Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could disclose the contents of encrypted wireless packets on an affected system. Windows Wireless Networking: Windows Wireless Networking MITRE Corporation: MITRE Corporation Impact: Information Disclosure Exploit
msrc
CVE-2020-24588MEDIUMCVSS 6.52021-05-11
CVE-2020-24588 [LOW] Windows Wireless Networking Spoofing Vulnerability Windows Wireless Networking Spoofing Vulnerability Windows Wireless Networking: Windows Wireless Networking MITRE Corporation: MITRE Corporation Impact: Spoofing Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174 Reference: https://catal
msrc
CVE-2020-26144MEDIUMCVSS 6.52021-05-11
CVE-2020-26144 [MEDIUM] Windows Wireless Networking Spoofing Vulnerability Windows Wireless Networking Spoofing Vulnerability Windows Wireless Networking: Windows Wireless Networking MITRE Corporation: MITRE Corporation Impact: Spoofing Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003174 Reference: https://ca
msrc
CVE-2021-28479MEDIUMCVSS 5.52021-05-11
CVE-2021-28479 [MEDIUM] Windows CSC Service Information Disclosure Vulnerability Windows CSC Service Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Windows CSC Service: Windows CSC Service Microsof
msrc
CVE-2021-31184MEDIUMCVSS 5.52021-05-11
CVE-2021-31184 [MEDIUM] Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode
msrc
CVE-2021-28357HIGHCVSS 8.82021-04-13
CVE-2021-28357 [HIGH] Remote Procedure Call Runtime Remote Code Execution Vulnerability Remote Procedure Call Runtime Remote Code Execution Vulnerability Windows Remote Procedure Call Runtime: Windows Remote Procedure Call Runtime Microsoft: Microsoft Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A Reference: https://catalog.update.microsoft.com/v7/site/S
msrc