Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows 8.1 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2015-6109
The kernel in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Infor...
Microsoft Windows 10 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows 10 1511
7.2
CVSSv2
CVE-2017-0165
An elevation of privilege vulnerability exists when Microsoft Windows running on Windows 10, Windows 10 1511, Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 fails to properly sanitize handles in memory, aka "Windows Elevation of Privilege Vulnerability."
Microsoft Windows 10 1511
Microsoft Windows Server 2012 R2
Microsoft Windows Rt 8.1
Microsoft Windows 8.1
Microsoft Windows 10
1 EDB exploit
2.1
CVSSv2
CVE-2022-21973
Windows Media Center Update Denial of Service Vulnerability
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
7.2
CVSSv2
CVE-2019-1392
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'.
Microsoft Windows 10 -
Microsoft Windows 8.1 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
1 Article
6.9
CVSSv2
CVE-2015-2368
Untrusted search path vulnerability in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Windows DLL Remote Code Exe...
Microsoft Windows 7 -
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 R2
Microsoft Windows 8.1 -
Microsoft Windows Rt 8.1 -
1 Article
7.2
CVSSv2
CVE-2014-4074
The Task Scheduler in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via an application that schedules a crafted task, aka "Task Scheduler Vulnerability."
Microsoft Windows Server 2012 R2
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 8 -
2.1
CVSSv2
CVE-2015-2382
win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnera...
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
Microsoft Windows 8.1 -
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
1 Article
4.6
CVSSv2
CVE-2015-1674
The kernel in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate an unspecified address, which allows local users to bypass the KASLR protection mechanism, and consequently discover the cng.sys base address, v...
Microsoft Windows 8.1 -
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
1 EDB exploit
7.2
CVSSv2
CVE-2015-0078
win32k.sys in the kernel-mode drivers in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate the token of a calling thread, which allows local users to gain privileges via a crafted application, aka "Win32...
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows Rt -
Microsoft Windows 8 -
1.9
CVSSv2
CVE-2015-0001
The Windows Error Reporting (WER) component in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to bypass the Protected Process Light protection mechanism and read the contents of arbitrary process-memory locations ...
Microsoft Windows Server 2012 R2
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows 8 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2012 -
2 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »