Msrc Windows Rt 8.1 vulnerabilities

1,911 known vulnerabilities affecting msrc/windows_rt_8.1.

Total CVEs
1,911
CISA KEV
82
actively exploited
Public exploits
174
Exploited in wild
94
Severity breakdown
CRITICAL32HIGH1267MEDIUM583LOW29

Vulnerabilities

Page 95 of 96
CVE-2016-3216HIGHCVSS 4.3PoC2016-06-14
CVE-2016-3216 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability Windows Graphics Component Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows Graphics Component (GDI32.dll) fails to properly handle objects in memory, allowing an attacker to retrieve information that could lead to an Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited this vulnerability could cause an inform
msrc
CVE-2016-3218HIGHCVSS 7.82016-06-14
CVE-2016-3218 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-3213LOWCVSS 8.8PoC2016-06-14
CVE-2016-3213 [HIGH] WPAD Elevation of Privilege Vulnerability WPAD Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Microsoft Windows when the Web Proxy Auto Discovery (WPAD) protocol falls back to a vulnerable proxy discovery process. An attacker who successfully exploited this vulnerability could bypass security and gain elevated privileges on a targeted system. To exploit the vulnerability, an attacker could respond to NetBIOS name requests
msrc
CVE-2016-0182CRITICALCVSS 7.82016-05-10
CVE-2016-0182 [HIGH] Windows Journal Memory Corruption Vulnerability Windows Journal Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Windows when a specially crafted Journal file is opened in Windows Journal. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user. If a user is logged on with administrative user rights, an attacker could take control of the affected
msrc
CVE-2016-0195CRITICALCVSS 8.82016-05-10
CVE-2016-0195 [HIGH] Windows Imaging Component Memory Corruption Vulnerability Windows Imaging Component Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Windows when the Windows Imaging Component fails to properly handle objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user
msrc
CVE-2016-0170CRITICALCVSS 8.8PoC2016-05-10
CVE-2016-0170 [HIGH] Windows Graphics Component Remote Code Execution Vulnerability Windows Graphics Component Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists due to the way the Windows Graphics Component handles objects in memory. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. User
msrc
CVE-2016-0184CRITICALCVSS 8.82016-05-10
CVE-2016-0184 [HIGH] Direct3D Use After Free RCE Vulnerability Direct3D Use After Free RCE Vulnerability Description: A remote code execution vulnerability exists when the Windows GDI component fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have
msrc
CVE-2016-0179CRITICALCVSS 7.82016-05-10
CVE-2016-0179 [HIGH] Windows Shell Remote Code Execution Vulnerability Windows Shell Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Windows Shell improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accoun
msrc
CVE-2016-0176HIGHCVSS 7.82016-05-10
CVE-2016-0176 [HIGH] DirectX Elevation of Privilege Vulnerability DirectX Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have t
msrc
CVE-2016-0168HIGHCVSS 6.5PoC2016-05-10
CVE-2016-0168 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability Windows Graphics Component Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convinc
msrc
CVE-2016-0196HIGHCVSS 7.82016-05-10
CVE-2016-0196 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-0171HIGHCVSS 7.8PoC2016-05-10
CVE-2016-0171 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-0173HIGHCVSS 7.8PoC2016-05-10
CVE-2016-0173 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-0175HIGHCVSS 3.32016-05-10
CVE-2016-0175 [LOW] Win32k Information Disclosure Vulnerability Win32k Information Disclosure Vulnerability Description: An information disclosure vulnerability exists in Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. An attacker who successfully exploited this vulnerability could retrieve the memory address of a kernel object. To exploit this vulnerability, an attacker would have to log on to an
msrc
CVE-2016-0169HIGHCVSS 6.5PoC2016-05-10
CVE-2016-0169 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability Windows Graphics Component Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convinc
msrc
CVE-2016-0180HIGHCVSS 7.82016-05-10
CVE-2016-0180 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle parsing of certain symbolic links. An attacker who successfully exploited this vulnerability could potentially access privileged registry keys and thereby elevate permissions. An attacker could then install programs; view, change, or delete dat
msrc
CVE-2016-0197HIGHCVSS 7.82016-05-10
CVE-2016-0197 [HIGH] Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Windows improperly handles objects in memory and incorrectly maps kernel memory. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. An attacker
msrc
CVE-2016-0174HIGHCVSS 7.82016-05-10
CVE-2016-0174 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc
CVE-2016-0151HIGHCVSS 7.8KEVPoC2016-04-12
CVE-2016-0151 [HIGH] Windows CSRSS Security Feature Bypass Vulnerability Windows CSRSS Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in Microsoft Windows when the Client-Server Run-time Subsystem (CSRSS) fails to properly manage process tokens in memory. An attacker who successfully exploited this vulnerability could run arbitrary code as an administrator. An attacker could then install programs; view, change, or delete data; or create new acc
msrc
CVE-2016-0128HIGHCVSS 6.82016-04-12
CVE-2016-0128 [MEDIUM] Windows SAM and LSAD Downgrade Vulnerability Windows SAM and LSAD Downgrade Vulnerability Description: An elevation of privilege vulnerability exists in the Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD) remote protocols when they accept authentication levels that do not protect them adequately. The vulnerability is caused by the way the SAM and LSAD remote protocols establish the Remote Procedure Call (RPC) channel. An attacker who suc
msrc