Msrc Windows Rt 8.1 vulnerabilities
1,911 known vulnerabilities affecting msrc/windows_rt_8.1.
Total CVEs
1,911
CISA KEV
82
actively exploited
Public exploits
174
Exploited in wild
94
Severity breakdown
CRITICAL32HIGH1267MEDIUM583LOW29
Vulnerabilities
Page 84 of 96
CVE-2017-8589CRITICALCVSS 9.82017-07-11
CVE-2017-8589 [CRITICAL] Windows Search Remote Code Execution Vulnerability
Windows Search Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit the vulnerability, the attacker could
msrc
CVE-2017-8556HIGHCVSS 7.02017-07-11
CVE-2017-8556 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8467HIGHCVSS 7.02017-07-11
CVE-2017-8467 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8561HIGHCVSS 7.02017-07-11
CVE-2017-8561 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerabi
msrc
CVE-2017-8578HIGHCVSS 7.02017-07-11
CVE-2017-8578 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8573HIGHCVSS 7.02017-07-11
CVE-2017-8573 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8562HIGHCVSS 7.02017-07-11
CVE-2017-8562 [HIGH] Windows ALPC Elevation of Privilege Vulnerability
Windows ALPC Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).
An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user ri
msrc
CVE-2017-8565HIGHCVSS 7.52017-07-11
CVE-2017-8565 [HIGH] Windows PowerShell Remote Code Execution Vulnerability
Windows PowerShell Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in PowerShell when PSObject wraps a CIM Instance. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system.
In an attack scenario, an attacker could execute malicious code in a PowerShell remote session.
The update addresses the vulnerability by correcting
msrc
CVE-2017-8563HIGHCVSS 7.52017-07-11
CVE-2017-8563 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully forward an authentication request to a Windows LDAP server, such as a system running Active Directory Domain Services (AD DS) or Active Directory Lightweight Directory Services (AD LDS), which has been configured to require signing or sealing on inc
msrc
CVE-2017-8577HIGHCVSS 7.02017-07-11
CVE-2017-8577 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8581HIGHCVSS 7.02017-07-11
CVE-2017-8581 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2017-8495HIGHCVSS 7.52017-07-11
CVE-2017-8495 [HIGH] Kerberos SNAME Security Feature Bypass Vulnerability
Kerberos SNAME Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists in Microsoft Windows when Kerberos fails to prevent tampering with the SNAME field during ticket exchange. An attacker who successfully exploited this vulnerability could use it to bypass Extended Protection for Authentication.
To exploit this vulnerability, an attacker would have to be able to launch a man-in-
msrc
CVE-2017-8590HIGHCVSS 8.82017-07-11
CVE-2017-8590 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
To exploit the vulnerability, an attacker would first have to log on to th
msrc
CVE-2017-8580HIGHCVSS 7.02017-07-11
CVE-2017-8580 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8582MEDIUMCVSS 5.92017-07-11
CVE-2017-8582 [MEDIUM] Http.sys Information Disclosure Vulnerability
Http.sys Information Disclosure Vulnerability
Description: An Information Disclosure vulnerability exists when the HTTP.sys server application component improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the HTTP.sys server application system.
A remote unauthenticated attacker could exploit this vulnerability by issuing a request to the
msrc
CVE-2017-8592MEDIUMCVSS 5.42017-07-11
CVE-2017-8592 [MEDIUM] Microsoft Browser Security Feature Bypass Vulnerability
Microsoft Browser Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists when Microsoft browsers improperly handle redirect requests. The vulnerability allows Microsoft browsers to bypass CORS redirect restrictions, and to follow redirect requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force the browser to send data t
msrc
CVE-2017-8587MEDIUMCVSS 6.52017-07-11
CVE-2017-8587 [MEDIUM] Windows Explorer Denial of Service Vulnerability
Windows Explorer Denial of Service Vulnerability
Description: An Denial Of Service vulnerability exists when Windows Explorer attempts to open a non-existent file. An attacker who successfully exploited this vulnerability could cause a denial of service.
A attacker could exploit this vulnerability by hosting a specially crafted web site and convince a user to browse to the page, containing the reference to the non-existing
msrc
CVE-2017-8557MEDIUMCVSS 5.52017-07-11
CVE-2017-8557 [MEDIUM] Windows System Information Console Information Disclosure Vulnerability
Windows System Information Console Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists in the Microsoft Common Console Document (.msc) when it improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration.
To exploit
msrc
CVE-2017-8463MEDIUMCVSS 6.32017-07-11
CVE-2017-8463 [HIGH] Windows Explorer Remote Code Execution Vulnerability
Windows Explorer Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Windows Explorer improperly handles executable files and shares during rename operations. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another user. Users not running as administrators would be less affected.
To exploit this vulnerability, an attacker w
msrc
CVE-2017-8486MEDIUMCVSS 4.72017-07-11
CVE-2017-8486 [MEDIUM] Win32k Information Disclosure Vulnerability
Win32k Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit the vulnerability, an attacker would have to either log on locally to an affected system, or convince a locally authenticated us
msrc