Vulnerabilities > Microsoft > Windows RT 8 1 > High

DATE CVE VULNERABILITY TITLE RISK
2020-11-11 CVE-2020-17024 Unspecified vulnerability in Microsoft products
Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability
local
low complexity
microsoft
7.8
2020-11-11 CVE-2020-17014 Unspecified vulnerability in Microsoft products
Windows Print Spooler Elevation of Privilege Vulnerability
local
low complexity
microsoft
7.8
2020-11-11 CVE-2020-17011 Unspecified vulnerability in Microsoft products
Windows Port Class Library Elevation of Privilege Vulnerability
local
low complexity
microsoft
7.8
2020-11-11 CVE-2020-17001 Unspecified vulnerability in Microsoft products
Windows Print Spooler Elevation of Privilege Vulnerability
local
low complexity
microsoft
7.8
2020-11-11 CVE-2020-16997 Unspecified vulnerability in Microsoft products
Remote Desktop Protocol Server Information Disclosure Vulnerability
network
low complexity
microsoft
7.7
2020-10-16 CVE-2020-16940 Improper Privilege Management vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles junction points.
local
low complexity
microsoft CWE-269
7.8
2020-10-16 CVE-2020-16939 Link Following vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists when Group Policy improperly checks access.
local
low complexity
microsoft CWE-59
7.8
2020-10-16 CVE-2020-16935 Unspecified vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists when Windows improperly handles COM object creation.
local
low complexity
microsoft
7.8
2020-10-16 CVE-2020-16933 Unspecified vulnerability in Microsoft products
<p>A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files.
local
high complexity
microsoft
7.0
2020-10-16 CVE-2020-16927 Unspecified vulnerability in Microsoft products
<p>A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests.
network
low complexity
microsoft
7.5