Msrc Windows Rt 8.1 vulnerabilities
1,911 known vulnerabilities affecting msrc/windows_rt_8.1.
Total CVEs
1,911
CISA KEV
82
actively exploited
Public exploits
174
Exploited in wild
94
Severity breakdown
CRITICAL32HIGH1267MEDIUM583LOW29
Vulnerabilities
Page 26 of 96
CVE-2021-38628HIGHCVSS 7.82021-09-14
CVE-2021-38628 [HIGH] Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Windows Ancillary Function Driver for WinSock: Windows Ancillary Function Driver for WinSock
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Refere
msrc
CVE-2021-38639HIGHCVSS 7.82021-09-14
CVE-2021-38639 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Windows Win32K: Windows Win32K
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
Reference: https://support.microsoft.com/help/5005568
Reference:
msrc
CVE-2021-40447HIGHCVSS 7.82021-09-14
CVE-2021-40447 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
msrc
CVE-2021-36969MEDIUMCVSS 5.52021-09-14
CVE-2021-36969 [MEDIUM] Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability
Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mod
msrc
CVE-2021-38629MEDIUMCVSS 6.52021-09-14
CVE-2021-38629 [MEDIUM] Windows Ancillary Function Driver for WinSock Information Disclosure Vulnerability
Windows Ancillary Function Driver for WinSock Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process.
msrc
CVE-2021-36972MEDIUMCVSS 5.52021-09-14
CVE-2021-36972 [MEDIUM] Windows SMB Information Disclosure Vulnerability
Windows SMB Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory and kernel memory - unintentional read access to memory contents in kernel space from a user mode process.
Windows SMB: Windows SMB
Microsoft: Microsoft
Impact: Information
msrc
CVE-2021-36962MEDIUMCVSS 5.52021-09-14
CVE-2021-36962 [MEDIUM] Windows Installer Information Disclosure Vulnerability
Windows Installer Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Dis
msrc
CVE-2021-38635MEDIUMCVSS 5.52021-09-14
CVE-2021-38635 [MEDIUM] Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability
Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read access to memory contents in kernel space from a user mode process.
Windows
msrc
CVE-2021-36961MEDIUMCVSS 5.52021-09-14
CVE-2021-36961 [MEDIUM] Windows Installer Denial of Service Vulnerability
Windows Installer Denial of Service Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
Reference: https://support.microsoft.com/help/5005
msrc
CVE-2021-38636MEDIUMCVSS 5.52021-09-14
CVE-2021-38636 [MEDIUM] Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability
Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read access to memory contents in kernel space from a user mode process.
Windows
msrc
CVE-2021-36959MEDIUMCVSS 5.52021-09-14
CVE-2021-36959 [MEDIUM] Windows Authenticode Spoofing Vulnerability
Windows Authenticode Spoofing Vulnerability
Windows Authenticode: Windows Authenticode
Microsoft: Microsoft
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
Reference: https://support.microsoft.com/help/5005568
Reference:
msrc
CVE-2021-26424CRITICALCVSS 9.92021-08-10
CVE-2021-26424 [CRITICAL] Windows TCP/IP Remote Code Execution Vulnerability
Windows TCP/IP Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
This vulnerability is remotely triggerable by a malicious Hyper-V guest that sends an ipv6 ping to the Hyper-V host. An attacker could send a specially crafted TCPIP packet to its host utilizing the TCPIP Protocol Stack (tcpip.sys) to process packets.
Is this attack specific to Hyper-V or applicable to all hypervis
msrc
CVE-2021-26432CRITICALCVSS 9.82021-08-10
CVE-2021-26432 [CRITICAL] Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability
Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability
FAQ: What system configurations would expose this vulnerability?
Servers that have installed the Network File System are exposed to this vulnerability in rpcxdr.sys.
An attacker would require read or write permission to any file on an NFS share on the victim system. If NFS is configured to allow anonymous access,
msrc
CVE-2021-36947HIGHCVSS 8.82021-08-10
CVE-2021-36947 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030
Re
msrc
CVE-2021-26433HIGHCVSS 7.52021-08-10
CVE-2021-26433 [HIGH] Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability
Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Windows Services for NFS ONCRPC XDR Driver: Windows Services for NFS ONCRPC XDR Driver
Microsoft: Microsoft
Impa
msrc
CVE-2021-34483HIGHCVSS 7.82021-08-10
CVE-2021-34483 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030
msrc
CVE-2021-34535HIGHCVSS 8.82021-08-10
CVE-2021-34535 [HIGH] Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.
In the case of Hyper-V, a malicious program running in a gues
msrc
CVE-2021-34537HIGHCVSS 7.82021-08-10
CVE-2021-34537 [HIGH] Windows Bluetooth Driver Elevation of Privilege Vulnerability
Windows Bluetooth Driver Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An authorized attacker could exploit the Windows Bluetooth driver vulnerability by programatically running certain functions that could lead to elevation of privilege on the Bluetooth component.
Windows Bluetooth Service: Windows Bluetooth Service
Microsoft: Microsoft
Impact: Elevation of Privi
msrc
CVE-2021-26426HIGHCVSS 7.02021-08-10
CVE-2021-26426 [HIGH] Windows User Account Profile Picture Elevation of Privilege Vulnerability
Windows User Account Profile Picture Elevation of Privilege Vulnerability
Windows User Profile Service: Windows User Profile Service
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Se
msrc
CVE-2021-34484HIGHCVSS 7.8KEVPoC2021-08-10
CVE-2021-34484 [HIGH] Windows User Profile Service Elevation of Privilege Vulnerability
Windows User Profile Service Elevation of Privilege Vulnerability
Windows User Profile Service: Windows User Profile Service
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB50
msrc