Msrc Windows 8.1 For 32-Bit Systems vulnerabilities

108 known vulnerabilities affecting msrc/windows_8.1_for_32-bit_systems.

Total CVEs
108
CISA KEV
3
actively exploited
Public exploits
23
Exploited in wild
4
Severity breakdown
CRITICAL5HIGH45MEDIUM50LOW8

Vulnerabilities

Page 3 of 6
CVE-2017-11779HIGHCVSS 8.12017-10-10
CVE-2017-11779 [HIGH] Windows DNSAPI Remote Code Execution Vulnerability Windows DNSAPI Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails to properly handle DNS responses. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. To exploit the vulnerability, the attacker would use a malicious DNS server to send corrupted DN
msrc
CVE-2017-11818MEDIUMCVSS 4.52017-10-10
CVE-2017-11818 [MEDIUM] Windows Storage Security Feature Bypass Vulnerability Windows Storage Security Feature Bypass Vulnerability Description: An Security Feature bypass vulnerability exists in Microsoft Windows storage when it fails to validate an integrity-level check. An attacker who successfully exploited the vulnerability could allow an application with a certain integrity level to execute code at a different integrity level. The update addresses the vulnerability by correcting how Micro
msrc
CVE-2017-11784MEDIUMCVSS 4.72017-10-10
CVE-2017-11784 [MEDIUM] Windows Kernel Information Disclosure Vulnerability Windows Kernel Information Disclosure Vulnerability Description: An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object. To exploit the vulnerability, an attacker would
msrc
CVE-2017-8628HIGHCVSS 8.12017-09-12
CVE-2017-8628 [MEDIUM] Microsoft Bluetooth Driver Spoofing Vulnerability Microsoft Bluetooth Driver Spoofing Vulnerability Description: A spoofing vulnerability exists in Microsoft's implementation of the Bluetooth stack. An attacker who successfully exploited this vulnerability could perform a man-in-the-middle attack and force a user's computer to unknowingly route traffic through the attacker's computer. The attacker can then monitor and read the traffic before sending it on to the intended
msrc
CVE-2017-8692MEDIUMCVSS 5.02017-09-12
CVE-2017-8692 [HIGH] Windows Uniscribe Remote Code Execution Vulnerability Windows Uniscribe Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configure
msrc
CVE-2017-8728MEDIUMCVSS 4.22017-09-12
CVE-2017-8728 [HIGH] Windows PDF Remote Code Execution Vulnerability Windows PDF Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the
msrc
CVE-2017-8680MEDIUMCVSS 5.5PoC2017-09-12
CVE-2017-8680 [MEDIUM] Windows GDI+ Information Disclosure Vulnerability Windows GDI+ Information Disclosure Vulnerability Description: A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted ap
msrc
CVE-2017-8684MEDIUMCVSS 5.5PoC2017-09-12
CVE-2017-8684 [MEDIUM] Windows GDI+ Information Disclosure Vulnerability Windows GDI+ Information Disclosure Vulnerability Description: A information disclosure vulnerability exists when the Windows GDI+ component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted ap
msrc
CVE-2017-8737LOWCVSS 2.62017-09-12
CVE-2017-8737 [HIGH] Windows PDF Remote Code Execution Vulnerability Windows PDF Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the
msrc
CVE-2017-8591HIGHCVSS 8.82017-08-08
CVE-2017-8591 [HIGH] Windows IME Remote Code Execution Vulnerability Windows IME Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Windows Input Method Editor (IME) when IME improperly handles parameters in a method of a DCOM class. The DCOM server is a Windows component installed regardless of which languages/IMEs are enabled. An attacker can instantiate the DCOM class and exploit the system even if IME is not enabled. To exploit this vulnerabilit
msrc
CVE-2017-8668MEDIUMCVSS 4.72017-08-08
CVE-2017-8668 [MEDIUM] Volume Manager Extension Driver Information Disclosure Vulnerability Volume Manager Extension Driver Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Volume Manager Extension Driver component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on
msrc
CVE-2017-0293LOWCVSS 3.62017-08-08
CVE-2017-0293 [HIGH] Windows PDF Remote Code Execution Vulnerability Windows PDF Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the
msrc
CVE-2017-8561HIGHCVSS 7.02017-07-11
CVE-2017-8561 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerabi
msrc
CVE-2017-8562HIGHCVSS 7.02017-07-11
CVE-2017-8562 [HIGH] Windows ALPC Elevation of Privilege Vulnerability Windows ALPC Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user ri
msrc
CVE-2017-8528HIGHCVSS 8.82017-06-13
CVE-2017-8528 [HIGH] Windows Uniscribe Remote Code Execution Vulnerability Windows Uniscribe Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configure
msrc
CVE-2017-8465HIGHCVSS 7.02017-06-13
CVE-2017-8465 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2017-8466HIGHCVSS 7.02017-06-13
CVE-2017-8466 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2017-8468HIGHCVSS 7.02017-06-13
CVE-2017-8468 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2017-8493MEDIUMCVSS 5.62017-06-13
CVE-2017-8493 [MEDIUM] Windows Security Feature Bypass Vulnerability Windows Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists when Microsoft Windows fails to enforce case sensitivity for certain variable checks, which could allow an attacker to set variables that are either read-only or require authentication. To exploit this vulnerability, an attacker could run a specially crafted application to bypass Unified Extensible Firmware Interface (UEFI
msrc
CVE-2017-8469MEDIUMCVSS 4.7PoC2017-06-13
CVE-2017-8469 [MEDIUM] Windows Kernel Information Disclosure Vulnerability Windows Kernel Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses t
msrc