Msrc Windows Rt 8.1 vulnerabilities

1,911 known vulnerabilities affecting msrc/windows_rt_8.1.

Total CVEs
1,911
CISA KEV
82
actively exploited
Public exploits
174
Exploited in wild
94
Severity breakdown
CRITICAL32HIGH1267MEDIUM583LOW29

Vulnerabilities

Page 94 of 96
CVE-2016-3319MEDIUMCVSS 4.22016-08-09
CVE-2016-3319 [HIGH] Windows PDF Remote Code Execution Vulnerability Windows PDF Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the
msrc
CVE-2016-3300MEDIUMCVSS 6.82016-08-09
CVE-2016-3300 [HIGH] NetLogon Elevation of Privilege Vulnerability NetLogon Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Windows Netlogon improperly establishes a secure communications channel to a domain controller. An attacker who successfully exploited the vulnerability could run a specially crafted application on a domain-joined system. To exploit the vulnerability, an attacker would require access to a domain-joined machine that poin
msrc
CVE-2016-3237MEDIUMCVSS 6.4PoC2016-08-09
CVE-2016-3237 [HIGH] Kerberos Security Feature Bypass Vulnerability Kerberos Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in Windows when Kerberos improperly handles a password change request and falls back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication protocol. An attacker who successfully exploited this vulnerability could use it to bypass Kerberos authentication. To exploit this vulnerability, an attacker w
msrc
CVE-2016-3238HIGHCVSS 8.82016-07-12
CVE-2016-3238 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability Windows Print Spooler Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows Print Spooler service does not properly validate print drivers while installing a printer from servers. An attacker who successfully exploited this vulnerability could use it to execute arbitrary code and take control of an affected system. An attacker could then install programs; view,
msrc
CVE-2016-3239HIGHCVSS 7.82016-07-12
CVE-2016-3239 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability Windows Print Spooler Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new acco
msrc
CVE-2016-3252HIGHCVSS 7.82016-07-12
CVE-2016-3252 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2016-3254HIGHCVSS 7.82016-07-12
CVE-2016-3254 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2016-3286HIGHCVSS 7.82016-07-12
CVE-2016-3286 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2016-3249HIGHCVSS 7.82016-07-12
CVE-2016-3249 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2016-3258MEDIUMCVSS 6.32016-07-12
CVE-2016-3258 [MEDIUM] Windows File System Security Feature Bypass Vulnerability Windows File System Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in the Windows kernel that could allow an attacker to exploit time of check time of use (TOCTOU) issues in file path-based checks from a low-integrity application. An attacker who successfully exploited this vulnerability could potentially modify files outside of a low-integrity level application. T
msrc
CVE-2016-3287MEDIUMCVSS 6.22016-07-12
CVE-2016-3287 [MEDIUM] Secure Boot Security Feature Bypass Vulnerability Secure Boot Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists when Windows Secure Boot improperly applies an affected policy. An attacker who successfully exploited this vulnerability could disable code integrity checks, allowing test-signed executables and drivers to be loaded on a target device. In addition, an attacker could bypass the Secure Boot Integrity Validation for
msrc
CVE-2016-3251LOWCVSS 3.32016-07-12
CVE-2016-3251 [LOW] Windows GDI Information Disclosure Vulnerability Windows GDI Information Disclosure Vulnerability Description: A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted a
msrc
CVE-2016-3272LOWCVSS 3.12016-07-12
CVE-2016-3272 [LOW] Windows Kernel Information Disclosure Vulnerability Windows Kernel Information Disclosure Vulnerability Description: An information disclosure vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle certain page fault system calls. An authenticated attacker who successfully exploited this vulnerability could disclose information from one process to another. To exploit the vulnerability, an attacker would have to either log on locally to an
msrc
CVE-2016-3225HIGHCVSS 7.8PoC2016-06-14
CVE-2016-3225 [HIGH] Windows SMB Server Elevation of Privilege Vulnerability Windows SMB Server Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) when an attacker forwards an authentication request intended for another service running on the same machine. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated permissions. To exploit the vulnerability, an attac
msrc
CVE-2016-3223HIGHCVSS 8.1PoC2016-06-14
CVE-2016-3223 [HIGH] Group Policy Elevation of Privilege Vulnerability Group Policy Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine. To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack agai
msrc
CVE-2016-3230HIGHCVSS 5.02016-06-14
CVE-2016-3230 [MEDIUM] Windows Search Denial of Service Vulnerability Windows Search Denial of Service Vulnerability Description: This vulnerability occurs when the Windows Search component fails to properly handle certain objects in memory. An attacker who successfully exploited this vulnerability could cause server performance to degrade sufficiently to cause a denial of service condition. To exploit this vulnerability, an attacker could use it to cause a denial of service attack and disrupt
msrc
CVE-2016-3299HIGHCVSS 5.32016-06-14
CVE-2016-3299 [MEDIUM] NetBIOS Elevation of Privilege Vulnerability NetBIOS Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Microsoft Windows when NetBIOS improperly handles responses. An attacker who successfully exploited the vulnerability could use it to hijack network traffic or render untrusted content in a browser outside of Enhanced Protected Mode (EPM) or an application container. To exploit the vulnerability, an attacker whose system
msrc
CVE-2016-3221HIGHCVSS 7.82016-06-14
CVE-2016-3221 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-3236HIGHCVSS 9.8PoC2016-06-14
CVE-2016-3236 [CRITICAL] Windows WPAD Proxy Discovery Elevation of Privilege Vulnerability Windows WPAD Proxy Discovery Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Microsoft Windows improperly handles certain proxy discovery scenarios using the Web Proxy Auto Discovery (WPAD) protocol method. An attacker who successfully exploited the vulnerability could potentially access and control network traffic for which the attacker does not have
msrc
CVE-2016-3220HIGHCVSS 7.8PoC2016-06-14
CVE-2016-3220 [HIGH] OpenType Font Driver Elevation of Privilege Vulnerability OpenType Font Driver Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data
msrc