Msrc Windows Rt 8.1 vulnerabilities
1,911 known vulnerabilities affecting msrc/windows_rt_8.1.
Total CVEs
1,911
CISA KEV
82
actively exploited
Public exploits
174
Exploited in wild
94
Severity breakdown
CRITICAL32HIGH1267MEDIUM583LOW29
Vulnerabilities
Page 48 of 96
CVE-2020-1270HIGHCVSS 7.82020-06-09
CVE-2020-1270 [HIGH] Windows WLAN Service Elevation of Privilege Vulnerability
Windows WLAN Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the wlansvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the
msrc
CVE-2020-1300HIGHCVSS 7.82020-06-09
CVE-2020-1300 [HIGH] Windows Remote Code Execution Vulnerability
Windows Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files.
To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver.
The update addresses the vulnerab
msrc
CVE-2020-1282HIGHCVSS 7.82020-06-09
CVE-2020-1282 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1262HIGHCVSS 7.82020-06-09
CVE-2020-1262 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2020-1317HIGHCVSS 7.82020-06-09
CVE-2020-1317 [HIGH] Group Policy Elevation of Privilege Vulnerability
Group Policy Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Group Policy improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.
T
msrc
CVE-2020-1310MEDIUMCVSS 6.42020-06-09
CVE-2020-1310 [MEDIUM] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulne
msrc
CVE-2020-1207MEDIUMCVSS 6.42020-06-09
CVE-2020-1207 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2020-1251MEDIUMCVSS 6.42020-06-09
CVE-2020-1251 [MEDIUM] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulne
msrc
CVE-2020-1160MEDIUMCVSS 5.52020-06-09
CVE-2020-1160 [MEDIUM] Microsoft Graphics Component Information Disclosure Vulnerability
Microsoft Graphics Component Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affecte
msrc
CVE-2020-1194MEDIUMCVSS 5.52020-06-09
CVE-2020-1194 [MEDIUM] Windows Registry Denial of Service Vulnerability
Windows Registry Denial of Service Vulnerability
Description: A denial of service vulnerability exists when Windows Registry improperly handles filesystem operations. An attacker who successfully exploited the vulnerability could cause a denial of service against a system.
To exploit the vulnerability, an attacker who has access to the system could run a specially crafted application.
The security update addresses the vulne
msrc
CVE-2020-1348MEDIUMCVSS 5.52020-06-09
CVE-2020-1348 [MEDIUM] Windows GDI Information Disclosure Vulnerability
Windows GDI Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a special
msrc
CVE-2020-1299MEDIUMCVSS 6.82020-06-09
CVE-2020-1299 [HIGH] LNK Remote Code Execution Vulnerability
LNK Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.
An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative
msrc
CVE-2020-1253MEDIUMCVSS 6.42020-06-09
CVE-2020-1253 [MEDIUM] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulne
msrc
CVE-2020-1263MEDIUMCVSS 5.52020-06-09
CVE-2020-1263 [MEDIUM] Windows Error Reporting Information Disclosure Vulnerability
Windows Error Reporting Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit the vulnerability, an attacker would have to log on to an affected system and run a special
msrc
CVE-2020-1175HIGHCVSS 7.82020-05-12
CVE-2020-1175 [HIGH] Jet Database Engine Remote Code Execution Vulnerability
Jet Database Engine Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the v
msrc
CVE-2020-1112HIGHCVSS 8.52020-05-12
CVE-2020-1112 [CRITICAL] Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) IIS module improperly handles uploaded content. An attacker who successfully exploited this vulnerability could upload restricted file types to an IIS-hosted folder.
To exploit thi
msrc
CVE-2020-1143HIGHCVSS 7.02020-05-12
CVE-2020-1143 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2020-1149HIGHCVSS 7.02020-05-12
CVE-2020-1149 [HIGH] Windows Runtime Elevation of Privilege Vulnerability
Windows Runtime Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context.
An attacker could exploit this vulnerability by running a specially crafted application on the victim system.
The update addresses the vulnera
msrc
CVE-2020-1070HIGHCVSS 7.82020-05-12
CVE-2020-1070 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new acco
msrc
CVE-2020-1081HIGHCVSS 7.82020-05-12
CVE-2020-1081 [HIGH] Windows Printer Service Elevation of Privilege Vulnerability
Windows Printer Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers. An authenticated attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges.
To exploit this vulnerability, an attacker would first have to log on
msrc