Msrc Windows 8.1 vulnerabilities

1,848 known vulnerabilities affecting msrc/windows_8.1.

Total CVEs
1,848
CISA KEV
80
actively exploited
Public exploits
162
Exploited in wild
91
Severity breakdown
CRITICAL29HIGH1242MEDIUM556LOW21

Vulnerabilities

Page 90 of 93
CVE-2016-7237MEDIUMCVSS 6.5PoC2016-11-08
CVE-2016-7237 [MEDIUM] Local Security Authority Subsystem Service Denial of Service Vulnerability Local Security Authority Subsystem Service Denial of Service Vulnerability Description: A denial of service vulnerability exists in the Windows Local Security Authority Subsystem Service (LSASS). A remote, but authenticated, attacker who successfully exploited this vulnerability could cause the target system to become nonresponsive. To exploit the vulnerability, a remote attacker would first have t
msrc
CVE-2016-7184MEDIUMCVSS 6.52016-11-08
CVE-2016-7184 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability Windows Common Log File System Driver Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to th
msrc
CVE-2016-7218MEDIUMCVSS 5.82016-11-08
CVE-2016-7218 [MEDIUM] Windows Bowser.sys Information Disclosure Vulnerability Windows Bowser.sys Information Disclosure Vulnerability Description: An information disclosure vulnerability exists in Windows when the Windows bowser.sys kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could potentially disclose contents of System memory to which they should not have access. To exploit this vulnerability, an authenticated attack
msrc
CVE-2016-3263HIGHCVSS 5.52016-10-11
CVE-2016-3263 [MEDIUM] GDI+ Information Disclosure Vulnerability GDI+ Information Disclosure Vulnerability Description: An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. An attacker who successfully exploited this vulnerability could use the retrieved information to circumvent Address Space Layout Randomization (ASLR) in Windows, which helps gu
msrc
CVE-2016-3396HIGHCVSS 7.82016-10-11
CVE-2016-3396 [HIGH] GDI+ Remote Code Execution Vulnerability GDI+ Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to
msrc
CVE-2016-0070HIGHCVSS 5.5PoC2016-10-11
CVE-2016-0070 [MEDIUM] Windows Kernel Local Elevation of Privilege Vulnerability Windows Kernel Local Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Kernel API improperly allows a user to access sensitive registry information. An attacker who successfully exploited the vulnerability could gain access to user account information that is not intended for the user. A locally authenticated attacker could exploit this vulnerability b
msrc
CVE-2016-3266HIGHCVSS 7.82016-10-11
CVE-2016-3266 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-7182HIGHCVSS 9.8PoC2016-10-11
CVE-2016-7182 [CRITICAL] Graphics Component Font Parsing Elevation of Privilege Vulnerability Graphics Component Font Parsing Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploits this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts
msrc
CVE-2016-3376HIGHCVSS 7.8PoC2016-10-11
CVE-2016-3376 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-3393HIGHCVSS 8.8KEV2016-10-11
CVE-2016-3393 [HIGH] GDI+ Remote Code Execution Vulnerability GDI+ Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are conf
msrc
CVE-2016-7185HIGHCVSS 7.8PoC2016-10-11
CVE-2016-7185 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-7211HIGHCVSS 7.32016-10-11
CVE-2016-7211 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-3270HIGHCVSS 7.82016-10-11
CVE-2016-3270 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-3262HIGHCVSS 5.52016-10-11
CVE-2016-3262 [MEDIUM] GDI+ Information Disclosure Vulnerability GDI+ Information Disclosure Vulnerability Description: An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. An attacker who successfully exploited this vulnerability could use the retrieved information to circumvent Address Space Layout Randomization (ASLR) in Windows, which helps gu
msrc
CVE-2016-3306HIGHCVSS 7.82016-09-13
CVE-2016-3306 [HIGH] Windows Session Object Elevation of Privilege Vulnerability Windows Session Object Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that Windows handles session objects. A locally authenticated attacker who successfully exploited the vulnerability could hijack the session of another user. To exploit the vulnerability, the attacker could run a specially crafted application. The security update corrects how Windows ha
msrc
CVE-2016-3305HIGHCVSS 7.82016-09-13
CVE-2016-3305 [HIGH] Windows Session Object Elevation of Privilege Vulnerability Windows Session Object Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that Windows handles session objects. A locally authenticated attacker who successfully exploited the vulnerability could hijack the session of another user. To exploit the vulnerability, the attacker could run a specially crafted application. The security update corrects how Windows ha
msrc
CVE-2016-3348HIGHCVSS 7.82016-09-13
CVE-2016-3348 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-3355HIGHCVSS 7.82016-09-13
CVE-2016-3355 [HIGH] Windows GDI Elevation of Privilege Vulnerability Windows GDI Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this v
msrc
CVE-2016-3368HIGHCVSS 7.52016-09-13
CVE-2016-3368 [HIGH] Windows Remote Code Execution Vulnerability Windows Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in the way that Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attacker who has a domain user account could create a specially crafted request, causing Windows to execute arbitrar
msrc
CVE-2016-3371MEDIUMCVSS 6.8PoC2016-09-13
CVE-2016-3371 [MEDIUM] Windows Elevation of Privilege Vulnerability Windows Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
msrc