Vulnerabilities > Microsoft > Windows 8 1 > High

DATE CVE VULNERABILITY TITLE RISK
2020-10-16 CVE-2020-16923 Unspecified vulnerability in Microsoft products
<p>A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory.
local
low complexity
microsoft
7.8
2020-10-16 CVE-2020-16920 Unspecified vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations.
local
low complexity
microsoft
7.8
2020-10-16 CVE-2020-16911 Unspecified vulnerability in Microsoft products
<p>A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory.
network
low complexity
microsoft
8.8
2020-10-16 CVE-2020-16902 Improper Privilege Management vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.</p> <p>A locally authenticated attacker could run arbitrary code with elevated system privileges.
local
low complexity
microsoft CWE-269
7.8
2020-10-16 CVE-2020-16900 Unspecified vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists when the Windows Event System improperly handles objects in memory.</p> <p>To exploit this vulnerability, an attacker would first have to gain execution on the victim system.
local
high complexity
microsoft
7.0
2020-10-16 CVE-2020-16896 Unspecified vulnerability in Microsoft products
<p>An information disclosure vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests.
network
low complexity
microsoft
7.5
2020-10-16 CVE-2020-16892 Unspecified vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory.</p>
local
low complexity
microsoft
7.8
2020-10-16 CVE-2020-16891 Improper Input Validation vulnerability in Microsoft products
<p>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system.
local
low complexity
microsoft CWE-20
8.8
2020-10-16 CVE-2020-16887 Unspecified vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory.
local
low complexity
microsoft
7.8
2020-09-11 CVE-2020-1593 Unspecified vulnerability in Microsoft products
<p>A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects.
network
low complexity
microsoft
7.6