Msrc Windows Rt 8.1 vulnerabilities
1,911 known vulnerabilities affecting msrc/windows_rt_8.1.
Total CVEs
1,911
CISA KEV
82
actively exploited
Public exploits
174
Exploited in wild
94
Severity breakdown
CRITICAL32HIGH1267MEDIUM583LOW29
Vulnerabilities
Page 29 of 96
CVE-2021-33765MEDIUMCVSS 6.22021-07-13
CVE-2021-33765 [MEDIUM] Windows Installer Spoofing Vulnerability
Windows Installer Spoofing Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.microsoft.com/help/5004244
Reference: https://cat
msrc
CVE-2021-34507MEDIUMCVSS 6.52021-07-13
CVE-2021-34507 [MEDIUM] Windows Remote Assistance Information Disclosure Vulnerability
Windows Remote Assistance Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.
Windows Remote Assistance: Windows Remote Assistance
Microsoft: Microsoft
Impact: Information Disclosu
msrc
CVE-2021-33763MEDIUMCVSS 5.52021-07-13
CVE-2021-33763 [MEDIUM] Windows Remote Access Connection Manager Information Disclosure Vulnerability
Windows Remote Access Connection Manager Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Windows
msrc
CVE-2021-34454MEDIUMCVSS 5.52021-07-13
CVE-2021-34454 [MEDIUM] Windows Remote Access Connection Manager Information Disclosure Vulnerability
Windows Remote Access Connection Manager Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.
Windows Shell: Windows Shell
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploit
msrc
CVE-2021-33757MEDIUMCVSS 5.32021-07-13
CVE-2021-33757 [MEDIUM] Windows Security Account Manager Remote Protocol Security Feature Bypass Vulnerability
Windows Security Account Manager Remote Protocol Security Feature Bypass Vulnerability
FAQ: How do the security updates released on July 13, 2021 provide protections for CVE-2021-33757?
After the security updates released on July 13, 2021 or later are installed, Advanced Encryption Standard (AES) encryption will be the preferred method when using the MS-SAMR protocol to change or set a
msrc
CVE-2021-34497MEDIUMCVSS 6.82021-07-13
CVE-2021-34497 [MEDIUM] Windows MSHTML Platform Remote Code Execution Vulnerability
Windows MSHTML Platform Remote Code Execution Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this s
msrc
CVE-2021-34448MEDIUMCVSS 6.8KEV2021-07-13
CVE-2021-34448 [MEDIUM] Scripting Engine Memory Corruption Vulnerability
Scripting Engine Memory Corruption Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would hav
msrc
CVE-2021-34440MEDIUMCVSS 5.52021-07-13
CVE-2021-34440 [MEDIUM] GDI+ Information Disclosure Vulnerability
GDI+ Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Impact: Information Disclosure
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release
msrc
CVE-2021-34496MEDIUMCVSS 5.52021-07-13
CVE-2021-34496 [MEDIUM] Windows GDI Information Disclosure Vulnerability
Windows GDI Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.
Microsoft Graphics Component: Microsoft Graphics Component
Micros
msrc
CVE-2021-33782MEDIUMCVSS 5.52021-07-13
CVE-2021-33782 [MEDIUM] Windows Authenticode Spoofing Vulnerability
Windows Authenticode Spoofing Vulnerability
Windows Authenticode: Windows Authenticode
Microsoft: Microsoft
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.microsoft.com/help/5004244
Reference:
msrc
CVE-2021-31962CRITICALCVSS 9.42021-06-08
CVE-2021-31962 [CRITICAL] Kerberos AppContainer Security Feature Bypass Vulnerability
Kerberos AppContainer Security Feature Bypass Vulnerability
FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability?
This vulnerability applies to Kerberos Service Principal Name (SPN) negotiation and subsequent LSASS (Local Security Authority Subsystem Service) authentication for sandboxed AppContainer processes.
Windows Kerberos: Windows Kerberos
Microsoft: Micros
msrc
CVE-2021-31968HIGHCVSS 7.52021-06-08
CVE-2021-31968 [HIGH] Windows Remote Desktop Services Denial of Service Vulnerability
Windows Remote Desktop Services Denial of Service Vulnerability
Windows Remote Desktop: Windows Remote Desktop
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: ht
msrc
CVE-2021-31958HIGHCVSS 7.52021-06-08
CVE-2021-31958 [HIGH] Windows NTLM Elevation of Privilege Vulnerability
Windows NTLM Elevation of Privilege Vulnerability
FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this specially crafted serve
msrc
CVE-2021-33742HIGHCVSS 7.5KEV2021-06-08
CVE-2021-33742 [HIGH] Windows MSHTML Platform Remote Code Execution Vulnerability
Windows MSHTML Platform Remote Code Execution Vulnerability
FAQ: The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2?
While Microsoft has announced retirement of the Internet Explorer 11 applicatio
msrc
CVE-2021-1675HIGHCVSS 7.8KEVPoC2021-06-08
CVE-2021-1675 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Remote Code Execution Vulnerability
FAQ: Is this the vulnerability that has been referred to publicly as PrintNightmare?
No, Microsoft has assigned CVE-2021-34527 to PrintNightmare. CVE-2021-1675 is similar but distinct from CVE-2021-34527.
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:
msrc
CVE-2021-31973HIGHCVSS 7.82021-06-08
CVE-2021-31973 [HIGH] Windows GPSVC Elevation of Privilege Vulnerability
Windows GPSVC Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: https://support.microsoft.com/help
msrc
CVE-2021-31953HIGHCVSS 7.82021-06-08
CVE-2021-31953 [HIGH] Windows Filter Manager Elevation of Privilege Vulnerability
Windows Filter Manager Elevation of Privilege Vulnerability
Windows Filter Manager: Windows Filter Manager
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: https:
msrc
CVE-2021-31975HIGHCVSS 7.52021-06-08
CVE-2021-31975 [HIGH] Server for NFS Information Disclosure Vulnerability
Server for NFS Information Disclosure Vulnerability
FAQ: What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.
Windows Network File System: Windows Network File System
Microsoft: Microsoft
Im
msrc
CVE-2021-31974HIGHCVSS 7.52021-06-08
CVE-2021-31974 [HIGH] Server for NFS Denial of Service Vulnerability
Server for NFS Denial of Service Vulnerability
Windows Network File System: Windows Network File System
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646
Reference: https://support.microsoft.c
msrc
CVE-2021-31956HIGHCVSS 7.8KEV2021-06-08
CVE-2021-31956 [HIGH] Windows NTFS Elevation of Privilege Vulnerability
Windows NTFS Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
Additionally, an attacker could convince a local user to open a malicious file. The attacker would ha
msrc