Msrc Windows 8.1 vulnerabilities
1,848 known vulnerabilities affecting msrc/windows_8.1.
Total CVEs
1,848
CISA KEV
80
actively exploited
Public exploits
162
Exploited in wild
91
Severity breakdown
CRITICAL29HIGH1242MEDIUM556LOW21
Vulnerabilities
Page 47 of 93
CVE-2020-1272HIGHCVSS 7.82020-06-09
CVE-2020-1272 [HIGH] Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.
A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create ne
msrc
CVE-2020-1291HIGHCVSS 7.02020-06-09
CVE-2020-1291 [HIGH] Windows Network Connections Service Elevation of Privilege Vulnerability
Windows Network Connections Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially c
msrc
CVE-2020-1255HIGHCVSS 8.52020-06-09
CVE-2020-1255 [HIGH] Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) IIS module improperly handles uploaded content. An attacker who successfully exploited this vulnerability could upload restricted file types to an IIS-hosted folder.
To exploit this vu
msrc
CVE-2020-1236HIGHCVSS 7.82020-06-09
CVE-2020-1236 [HIGH] Jet Database Engine Remote Code Execution Vulnerability
Jet Database Engine Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the v
msrc
CVE-2020-0915HIGHCVSS 7.82020-06-09
CVE-2020-0915 [HIGH] Windows GDI Elevation of Privilege Vulnerability
Windows GDI Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this v
msrc
CVE-2020-0986HIGHCVSS 7.8KEV2020-06-09
CVE-2020-0986 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2020-1212HIGHCVSS 7.82020-06-09
CVE-2020-1212 [HIGH] OLE Automation Elevation of Privilege Vulnerability
OLE Automation Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when an OLE Automation component improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how an OLE
msrc
CVE-2020-1269HIGHCVSS 7.82020-06-09
CVE-2020-1269 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2020-1247HIGHCVSS 7.02020-06-09
CVE-2020-1247 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2020-1196HIGHCVSS 7.02020-06-09
CVE-2020-1196 [HIGH] Windows Print Configuration Elevation of Privilege Vulnerability
Windows Print Configuration Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the printconfig.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security upd
msrc
CVE-2020-1314HIGHCVSS 7.02020-06-09
CVE-2020-1314 [HIGH] Windows Text Service Framework Elevation of Privilege Vulnerability
Windows Text Service Framework Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows Text Service Framework (TSF) when the TSF server fails to properly handle messages sent from TSF clients. An attacker who successfully exploited this vulnerability could run arbitrary code in a privileged process. An attacker could then install programs; view, change, or
msrc
CVE-2020-1254HIGHCVSS 7.82020-06-09
CVE-2020-1254 [HIGH] Windows Modules Installer Service Elevation of Privilege Vulnerability
Windows Modules Installer Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Windows Modules Installer Service improperly handles class object members.
A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full u
msrc
CVE-2020-1281HIGHCVSS 7.82020-06-09
CVE-2020-1281 [HIGH] Windows OLE Remote Code Execution Vulnerability
Windows OLE Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code.
To exploit the vulnerability, an attacker would have to convince a user to open either a specially crafted file or a program from either a webpage or an email message.
The update addresse
msrc
CVE-2020-1246HIGHCVSS 7.82020-06-09
CVE-2020-1246 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2020-0916HIGHCVSS 7.82020-06-09
CVE-2020-0916 [HIGH] Windows GDI Elevation of Privilege Vulnerability
Windows GDI Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this v
msrc
CVE-2020-1208HIGHCVSS 7.82020-06-09
CVE-2020-1208 [HIGH] Jet Database Engine Remote Code Execution Vulnerability
Jet Database Engine Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the v
msrc
CVE-2020-1239HIGHCVSS 8.82020-06-09
CVE-2020-1239 [HIGH] Media Foundation Memory Corruption Vulnerability
Media Foundation Memory Corruption Vulnerability
Description: A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to
msrc
CVE-2020-1301HIGHCVSS 7.52020-06-09
CVE-2020-1301 [HIGH] Windows SMB Authenticated Remote Code Execution Vulnerability
Windows SMB Authenticated Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server.
To exploit the vulnerability an authenticated attacker could send a specially craf
msrc
CVE-2020-1231HIGHCVSS 7.82020-06-09
CVE-2020-1231 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1311HIGHCVSS 7.82020-06-09
CVE-2020-1311 [HIGH] Component Object Model Elevation of Privilege Vulnerability
Component Object Model Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Component Object Model (COM) client uses special case IIDs. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
msrc