Msrc Windows Rt 8.1 vulnerabilities
1,911 known vulnerabilities affecting msrc/windows_rt_8.1.
Total CVEs
1,911
CISA KEV
82
actively exploited
Public exploits
174
Exploited in wild
94
Severity breakdown
CRITICAL32HIGH1267MEDIUM583LOW29
Vulnerabilities
Page 59 of 96
CVE-2019-1382HIGHCVSS 7.82019-11-12
CVE-2019-1382 [MEDIUM] Microsoft ActiveX Installer Service Elevation of Privilege Vulnerability
Microsoft ActiveX Installer Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when ActiveX Installer service may allow access to files without proper authentication. An attacker who successfully exploited the vulnerability could potentially access unauthorized files.
To exploit this vulnerability, an authenticated attacker could run a specially c
msrc
CVE-2019-1395HIGHCVSS 7.82019-11-12
CVE-2019-1395 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2019-1388HIGHCVSS 7.8KEV2019-11-12
CVE-2019-1388 [HIGH] Windows Certificate Dialog Elevation of Privilege Vulnerability
Windows Certificate Dialog Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data.
To exploit this vulnerability, an
msrc
CVE-2019-1384HIGHCVSS 8.52019-11-12
CVE-2019-1384 [CRITICAL] Microsoft Windows Security Feature Bypass Vulnerability
Microsoft Windows Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages.
To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges.
The
msrc
CVE-2019-1396HIGHCVSS 7.82019-11-12
CVE-2019-1396 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2019-1394HIGHCVSS 7.82019-11-12
CVE-2019-1394 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2019-1424HIGHCVSS 8.12019-11-12
CVE-2019-1424 [HIGH] NetLogon Security Feature Bypass Vulnerability
NetLogon Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists when Windows Netlogon improperly handles a secure communications channel. An attacker who successfully exploited the vulnerability could downgrade aspects of the connection allowing for further modification of the transmission.
To exploit the vulnerability, an attacker would require an active man in the middle attack to be
msrc
CVE-2019-1392HIGHCVSS 7.02019-11-12
CVE-2019-1392 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2019-1438HIGHCVSS 7.02019-11-12
CVE-2019-1438 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2019-1422HIGHCVSS 7.82019-11-12
CVE-2019-1422 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the iphlpsvc.dll handles file creation allowing for a file overwrite. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the
msrc
CVE-2019-1419HIGHCVSS 7.82019-11-12
CVE-2019-1419 [HIGH] OpenType Font Parsing Remote Code Execution Vulnerability
OpenType Font Parsing Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully expl
msrc
CVE-2019-1405HIGHCVSS 7.8KEVPoC2019-11-12
CVE-2019-1405 [HIGH] Windows UPnP Service Elevation of Privilege Vulnerability
Windows UPnP Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accoun
msrc
CVE-2019-1456HIGHCVSS 7.82019-11-12
CVE-2019-1456 [HIGH] OpenType Font Parsing Remote Code Execution Vulnerability
OpenType Font Parsing Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully expl
msrc
CVE-2019-1380HIGHCVSS 7.82019-11-12
CVE-2019-1380 [HIGH] Microsoft splwow64 Elevation of Privilege Vulnerability
Microsoft splwow64 Elevation of Privilege Vulnerability
Description: A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.
This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be
msrc
CVE-2019-1454HIGHCVSS 5.52019-11-12
CVE-2019-1454 [MEDIUM] Windows User Profile Service Elevation of Privilege Vulnerability
Windows User Profile Service Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context.
To exploit this vulnerability, an attacker would first have to log on to the system. An attack
msrc
CVE-2019-1407HIGHCVSS 7.82019-11-12
CVE-2019-1407 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2019-1435HIGHCVSS 7.02019-11-12
CVE-2019-1435 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2019-1408HIGHCVSS 7.82019-11-12
CVE-2019-1408 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2019-11135MEDIUMCVSS 4.72019-11-12
CVE-2019-11135 [MEDIUM] Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application
msrc
CVE-2019-1381MEDIUMCVSS 6.62019-11-12
CVE-2019-1381 [MEDIUM] Microsoft Windows Information Disclosure Vulnerability
Microsoft Windows Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows Servicing Stack allows access to unprivileged file locations. An attacker who successfully exploited the vulnerability could potentially access unauthorized files.
To exploit this vulnerability, an authenticated attacker could run a specially crafted application in user mode.
The update a
msrc