Msrc Windows Rt 8.1 vulnerabilities
1,911 known vulnerabilities affecting msrc/windows_rt_8.1.
Total CVEs
1,911
CISA KEV
82
actively exploited
Public exploits
174
Exploited in wild
94
Severity breakdown
CRITICAL32HIGH1267MEDIUM583LOW29
Vulnerabilities
Page 25 of 96
CVE-2021-38662MEDIUMCVSS 5.52021-10-12
CVE-2021-38662 [MEDIUM] Windows Fast FAT File System Driver Information Disclosure Vulnerability
Windows Fast FAT File System Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Fast FAT Driver: Windows Fast
msrc
CVE-2021-40455MEDIUMCVSS 5.52021-10-12
CVE-2021-40455 [MEDIUM] Windows Installer Spoofing Vulnerability
Windows Installer Spoofing Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672
Reference: https://support.microsoft.com/help/5006672
Reference: https://cat
msrc
CVE-2021-38663MEDIUMCVSS 5.52021-10-12
CVE-2021-38663 [MEDIUM] Windows exFAT File System Information Disclosure Vulnerability
Windows exFAT File System Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Windows exFAT File System: Windows exFAT File System
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;
msrc
CVE-2021-41342MEDIUMCVSS 6.82021-10-12
CVE-2021-41342 [MEDIUM] Windows MSHTML Platform Remote Code Execution Vulnerability
Windows MSHTML Platform Remote Code Execution Vulnerability
FAQ: The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2?
While Microsoft has announced retirement of the Internet Explorer 11 applicat
msrc
CVE-2021-40454MEDIUMCVSS 5.52021-10-12
CVE-2021-40454 [MEDIUM] Rich Text Edit Control Information Disclosure Vulnerability
Rich Text Edit Control Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
An attacker that successfully exploited this vulnerability could recover cleartext passwords from memory.
Rich Text Edit Control: Rich Text Edit Control
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release
msrc
CVE-2021-41343MEDIUMCVSS 5.52021-10-12
CVE-2021-41343 [MEDIUM] Windows Fast FAT File System Driver Information Disclosure Vulnerability
Windows Fast FAT File System Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Fast FAT Driver: Windows Fast
msrc
CVE-2021-41332MEDIUMCVSS 6.52021-10-12
CVE-2021-41332 [MEDIUM] Windows Print Spooler Information Disclosure Vulnerability
Windows Print Spooler Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclos
msrc
CVE-2021-38638HIGHCVSS 7.82021-09-14
CVE-2021-38638 [HIGH] Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock: Windows Ancillary Function Driver for WinSock
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Refere
msrc
CVE-2021-38630HIGHCVSS 7.82021-09-14
CVE-2021-38630 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
Reference: https://su
msrc
CVE-2021-36964HIGHCVSS 7.82021-09-14
CVE-2021-36964 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
Reference: https://su
msrc
CVE-2021-40444HIGHCVSS 8.8KEVPoC2021-09-14
CVE-2021-40444 [HIGH] Microsoft MSHTML Remote Code Execution Vulnerability
Microsoft MSHTML Remote Code Execution Vulnerability
Description: Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.
An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that host
msrc
CVE-2021-36965HIGHCVSS 8.82021-09-14
CVE-2021-36965 [HIGH] Windows WLAN AutoConfig Service Remote Code Execution Vulnerability
Windows WLAN AutoConfig Service Remote Code Execution Vulnerability
Windows WLAN Auto Config Service: Windows WLAN Auto Config Service
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.
msrc
CVE-2021-36955HIGHCVSS 7.8KEV2021-09-14
CVE-2021-36955 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.micr
msrc
CVE-2021-36974HIGHCVSS 7.82021-09-14
CVE-2021-36974 [HIGH] Windows SMB Elevation of Privilege Vulnerability
Windows SMB Elevation of Privilege Vulnerability
Windows SMB: Windows SMB
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
Reference: https://support.microsoft.com/help/5005568
Refere
msrc
CVE-2021-36963HIGHCVSS 7.82021-09-14
CVE-2021-36963 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.micr
msrc
CVE-2021-38671HIGHCVSS 7.82021-09-14
CVE-2021-38671 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
msrc
CVE-2021-26435HIGHCVSS 8.12021-09-14
CVE-2021-26435 [HIGH] Windows Scripting Engine Memory Corruption Vulnerability
Windows Scripting Engine Memory Corruption Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the f
msrc
CVE-2021-36960HIGHCVSS 7.52021-09-14
CVE-2021-36960 [HIGH] Windows SMB Information Disclosure Vulnerability
Windows SMB Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process.
Windows SMB: Windows SMB
Microsoft: Microsoft
Impact: Information Di
msrc
CVE-2021-38667HIGHCVSS 7.82021-09-14
CVE-2021-38667 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
FAQ: Where can I find more information about this security update?
Please see KB5005652.
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely
msrc
CVE-2021-38633HIGHCVSS 7.82021-09-14
CVE-2021-38633 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver: Windows Common Log File System Driver
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.micr
msrc