This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2013-11-12
Product Windows Rt 8.1 Last view 2021-09-15
Version - Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:microsoft:windows_rt_8.1

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2021-09-15 CVE-2021-40447

Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-38671.

7.8 2021-09-15 CVE-2021-40444

Microsoft MSHTML Remote Code Execution Vulnerability

7.8 2021-09-15 CVE-2021-38671

Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-40447.

7.8 2021-09-15 CVE-2021-38667

Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38671, CVE-2021-40447.

7.8 2021-09-15 CVE-2021-38639

Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36975.

7.8 2021-09-15 CVE-2021-38638

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38628.

5.5 2021-09-15 CVE-2021-38636

Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-36969, CVE-2021-38635.

7.8 2021-09-15 CVE-2021-38633

Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36955, CVE-2021-36963.

7.8 2021-09-15 CVE-2021-38630

Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36964.

6.5 2021-09-15 CVE-2021-38629

Windows Ancillary Function Driver for WinSock Information Disclosure Vulnerability

7.8 2021-09-15 CVE-2021-38628

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38638.

7.8 2021-09-15 CVE-2021-36974

Windows SMB Elevation of Privilege Vulnerability

5.5 2021-09-15 CVE-2021-36972

Windows SMB Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-36960.

5.5 2021-09-15 CVE-2021-36969

Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-38635, CVE-2021-38636.

9.8 2021-09-15 CVE-2021-36965

Windows WLAN AutoConfig Service Remote Code Execution Vulnerability

7.8 2021-09-15 CVE-2021-36964

Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38630.

7.8 2021-09-15 CVE-2021-36963

Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36955, CVE-2021-38633.

5.5 2021-09-15 CVE-2021-36962

Windows Installer Information Disclosure Vulnerability

6.1 2021-09-15 CVE-2021-36961

Windows Installer Denial of Service Vulnerability

7.5 2021-09-15 CVE-2021-36960

Windows SMB Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-36972.

7.8 2021-09-15 CVE-2021-36955

Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36963, CVE-2021-38633.

7.8 2021-09-15 CVE-2021-26435

Windows Scripting Engine Memory Corruption Vulnerability

8.8 2021-08-12 CVE-2021-36947

Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36958.

7.8 2021-08-12 CVE-2021-36937

Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability

9.8 2021-08-12 CVE-2021-36936

Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36947, CVE-2021-36958.

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
22% (144) CWE-200 Information Exposure
14% (92) CWE-269 Improper Privilege Management
11% (76) CWE-264 Permissions, Privileges, and Access Controls
8% (53) CWE-20 Improper Input Validation
6% (42) CWE-787 Out-of-bounds Write
3% (25) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
2% (19) CWE-665 Improper Initialization
2% (19) CWE-404 Improper Resource Shutdown or Release
2% (19) CWE-94 Failure to Control Generation of Code ('Code Injection')
2% (15) CWE-416 Use After Free
2% (13) CWE-611 Information Leak Through XML External Entity File Disclosure
2% (13) CWE-125 Out-of-bounds Read
1% (11) CWE-254 Security Features
1% (11) CWE-59 Improper Link Resolution Before File Access ('Link Following')
1% (9) CWE-19 Data Handling
0% (5) CWE-190 Integer Overflow or Wraparound
0% (4) CWE-476 NULL Pointer Dereference
0% (4) CWE-426 Untrusted Search Path
0% (4) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
0% (4) CWE-362 Race Condition
0% (4) CWE-310 Cryptographic Issues
0% (4) CWE-287 Improper Authentication
0% (3) CWE-755 Improper Handling of Exceptional Conditions
0% (3) CWE-415 Double Free
0% (3) CWE-399 Resource Management Errors

SAINT Exploits

Description Link
Windows OLE Automation Array command execution More info here
Windows RRAS Service Remote Code Execution Vulnerability More info here
Windows OLE Package Manager CPackage::DoVerb() INF File Download Vulnerability More info here

ExploitDB Exploits

id Description
35236 MS14-064 Microsoft Windows OLE Package Manager Code Execution
35235 MS14-064 Microsoft Windows OLE Package Manager Code Execution Through Python
35230 Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF)
35229 Internet Explorer <11 - OLE Automation Array Remote Code Execution
35216 MS Office 2007 and 2010 - OLE Arbitrary Command Execution
35101 Windows TrackPopupMenu Win32k NULL Pointer Dereference
35055 Windows OLE - Remote Code Execution "Sandworm" Exploit (MS14-060)
35020 MS14-060 Microsoft Windows OLE Package Manager Code Execution
35019 Windows OLE Package Manager SandWorm Exploit
30397 Windows Kernel win32k.sys - Integer Overflow (MS13-101)

Information Assurance Vulnerability Management (IAVM)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0216 Multiple Vulnerabilities in Microsoft Windows Journal (MS15-098)
Severity: Category II - VMSKEY: V0061393
2015-A-0215 Multiple Vulnerabilities in Microsoft Windows Task Management (MS15-102)
Severity: Category II - VMSKEY: V0061391
2015-A-0212 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-097)
Severity: Category II - VMSKEY: V0061385
2015-A-0197 Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088)
Severity: Category II - VMSKEY: V0061313
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0193 Multiple Privilege Escalation Vulnerabilities in Microsoft Windows (MS15-090)
Severity: Category II - VMSKEY: V0061305
2015-A-0192 Microsoft Windows Mount Manager Privilege Escalation Vulnerability (MS15-085)
Severity: Category I - VMSKEY: V0061303
2015-A-0190 Multiple Vulnerabilities in Microsoft Remote Desktop Protocol (RDP) (MS15-082)
Severity: Category II - VMSKEY: V0061299
2015-A-0188 Cumulative Security Update for Microsoft Internet Explorer (MS15-079)
Severity: Category I - VMSKEY: V0061297
2015-B-0096 Microsoft WebDAV Information Disclosure Vulnerability (MS15-089)
Severity: Category II - VMSKEY: V0061285
2015-A-0169 Multiple Vulnerabilities in Microsoft OLE (MS15-075)
Severity: Category II - VMSKEY: V0061103
2015-A-0165 Microsoft Remote Procedure Call (RPC) Privilege Escalation Vulnerability (MS1...
Severity: Category II - VMSKEY: V0061093
2015-A-0164 Microsoft Windows Installer Privilege Escalation Vulnerability (MS15-074)
Severity: Category II - VMSKEY: V0061095
2015-A-0162 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-073)
Severity: Category II - VMSKEY: V0061097
2015-A-0168 Microsoft Graphics Component Privilege Escalation Vulnerability (MS15-072)
Severity: Category II - VMSKEY: V0061105
2015-A-0167 Multiple Vulnerabilities in Microsoft Windows (MS15-069)
Severity: Category II - VMSKEY: V0061129
2015-A-0125 Microsoft Common Controls Could Allow Remote Code Execution Vulnerability (MS...
Severity: Category II - VMSKEY: V0060943
2015-A-0111 Microsoft SChannel Information Disclosure Vulnerability (MS15-055)
Severity: Category I - VMSKEY: V0060659
2015-A-0108 Multiple Vulnerabilities in Microsoft Windows Kernel-Mode Driver (MS15-051)
Severity: Category II - VMSKEY: V0060653
2015-A-0107 Microsoft Service Control Manager Privilege Escalation Vulnerability (MS15-050)
Severity: Category II - VMSKEY: V0060651
2015-A-0091 Multiple Vulnerabilities in Microsoft Windows (MS15-038)
Severity: Category II - VMSKEY: V0059897
2015-B-0037 Microsoft Windows Task Scheduler Security Feature Bypass Vulnerability (MS15-...
Severity: Category II - VMSKEY: V0059023
2015-B-0036 Microsoft Windows Information Disclosure Vulnerability (MS15-024)
Severity: Category II - VMSKEY: V0059021
2015-B-0034 Microsoft Windows Photo Decoder Component Information Disclosure Vulnerabilit...
Severity: Category II - VMSKEY: V0059017

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56856 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56855 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56854 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56853 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56852 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56851 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56850 - Type : OS-WINDOWS - Revision : 1
2021-02-11 Microsoft Windows Win32k kernel driver privilege escalation attempt
RuleID : 56849 - Type : OS-WINDOWS - Revision : 1
2021-01-28 Cisco RV Series Routers stack buffer overflow attempt
RuleID : 56843 - Type : SERVER-WEBAPP - Revision : 2
2021-01-12 Microsoft Windows SMB2 SET_INFO information disclosure attempt
RuleID : 56571 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56562 - Type : OS-WINDOWS - Revision : 1
2021-01-08 Microsoft Windows SMB authenticated remote code execution attempt
RuleID : 56561 - Type : OS-WINDOWS - Revision : 1
2020-12-12 Windows Network File System denial of service attempt
RuleID : 56309 - Type : PROTOCOL-RPC - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56302 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows NFS read procedure remote code execution attempt
RuleID : 56301 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56296 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Common Log Files System driver privilege escalation attempt
RuleID : 56295 - Type : FILE-OTHER - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56262 - Type : OS-WINDOWS - Revision : 1
2020-12-10 Microsoft Windows Win32k elevation of privilege attempt
RuleID : 56261 - Type : OS-WINDOWS - Revision : 1
2020-12-08 Microsoft Windows Kernel Cryptography Driver privilege escalation attempt
RuleID : 56231 - Type : OS-WINDOWS - Revision : 1
2020-12-08 Microsoft Windows Kernel Cryptography Driver privilege escalation attempt
RuleID : 56230 - Type : OS-WINDOWS - Revision : 1
2020-11-12 Microsoft Windows Remote Desktop information disclosure attempt
RuleID : 55994 - Type : OS-WINDOWS - Revision : 1
2020-11-12 Microsoft Windows digital signature spoofing attempt
RuleID : 55983 - Type : OS-WINDOWS - Revision : 1
2020-11-12 Microsoft Windows digital signature spoofing attempt
RuleID : 55982 - Type : OS-WINDOWS - Revision : 1
2020-10-08 Microsoft Windows kernel driver escalation of privilege attempt
RuleID : 55188 - Type : OS-WINDOWS - Revision : 1

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053578.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053579.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053580.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4053581.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054517.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054518.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054519.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_4054520.nasl - Type: ACT_GATHER_INFO
2017-12-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_dec_win2008.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048952.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048953.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048954.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048955.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048956.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048957.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048958.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_4048959.nasl - Type: ACT_GATHER_INFO
2017-11-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_nov_win2008.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_aug_4034668.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_jul_4025338.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4042895.nasl - Type: ACT_GATHER_INFO
2017-11-03 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_sep_4038781.nasl - Type: ACT_GATHER_INFO
2017-10-12 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_win2008.nasl - Type: ACT_GATHER_INFO
2017-10-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4041676.nasl - Type: ACT_GATHER_INFO
2017-10-10 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17_oct_4041681.nasl - Type: ACT_GATHER_INFO