Vulnerabilities

Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.

Filtering: Tag: windows-7 Clear
ID Title
CVE-2017-11815 Information Disclosure in microsoft (CVE-2017-11815)
vulnerability in microsoft (CVE-2017-11815). Confidential information can be exposed externally.
CVE-2017-11814 Information Disclosure in microsoft (CVE-2017-11814)
vulnerability in microsoft (CVE-2017-11814). Confidential information can be exposed externally.
CVE-2017-11813 Buffer Overflow in microsoft (CVE-2017-11813)
vulnerability in microsoft (CVE-2017-11813). Successful exploitation can lead to full system takeover.
CVE-2017-11810 Buffer Overflow in microsoft (CVE-2017-11810)
vulnerability in microsoft (CVE-2017-11810). Successful exploitation can lead to full system takeover.
CVE-2017-11793 Buffer Overflow in microsoft (CVE-2017-11793)
vulnerability in microsoft (CVE-2017-11793). Successful exploitation can lead to full system takeover.
CVE-2017-11790 Information Disclosure in microsoft (CVE-2017-11790)
vulnerability in microsoft (CVE-2017-11790). Risk of unauthorized operations or information disclosure.
CVE-2017-11785 Information Disclosure in microsoft (CVE-2017-11785)
vulnerability in microsoft (CVE-2017-11785). Confidential information can be exposed externally.
CVE-2017-11784 Information Disclosure in microsoft (CVE-2017-11784)
vulnerability in microsoft (CVE-2017-11784). Confidential information can be exposed externally.
CVE-2017-11781 Vulnerability in dos (CVE-2017-11781)
vulnerability in dos (CVE-2017-11781). Risk of unauthorized operations or information disclosure.
CVE-2017-11780 Vulnerability in microsoft (CVE-2017-11780)
vulnerability in microsoft (CVE-2017-11780). Confidential information can be exposed externally.
CVE-2017-11772 Information Disclosure in microsoft (CVE-2017-11772)
vulnerability in microsoft (CVE-2017-11772). Confidential information can be exposed externally.
CVE-2017-11771 Vulnerability in microsoft (CVE-2017-11771)
vulnerability in microsoft (CVE-2017-11771). Successful exploitation can lead to full system takeover.
CVE-2017-11765 Information Disclosure in microsoft (CVE-2017-11765)
vulnerability in microsoft (CVE-2017-11765). Confidential information can be exposed externally.
CVE-2017-11763 Vulnerability in microsoft (CVE-2017-11763)
vulnerability in microsoft (CVE-2017-11763). Successful exploitation can lead to full system takeover.
CVE-2017-11762 Vulnerability in microsoft (CVE-2017-11762)
vulnerability in microsoft (CVE-2017-11762). Successful exploitation can lead to full system takeover.
CVE-2017-10855 Vulnerability in fujitsu (CVE-2017-10855)
vulnerability in fujitsu (CVE-2017-10855). Successful exploitation can lead to full system takeover.
CVE-2017-8741 Buffer Overflow in microsoft (CVE-2017-8741)
vulnerability in microsoft (CVE-2017-8741). Successful exploitation can lead to full system takeover.
CVE-2017-8719 Information Disclosure in microsoft (CVE-2017-8719)
vulnerability in microsoft (CVE-2017-8719). Confidential information can be exposed externally.
CVE-2017-8720 Vulnerability in microsoft (CVE-2017-8720)
vulnerability in microsoft (CVE-2017-8720). Successful exploitation can lead to full system takeover.
CVE-2017-8733 Vulnerability in microsoft (CVE-2017-8733)
vulnerability in microsoft (CVE-2017-8733). Risk of unauthorized operations or information disclosure.
CVE-2017-8736 Information Disclosure in microsoft (CVE-2017-8736)
vulnerability in microsoft (CVE-2017-8736). Risk of unauthorized operations or information disclosure.
CVE-2017-8747 Buffer Overflow in microsoft (CVE-2017-8747)
vulnerability in microsoft (CVE-2017-8747). Successful exploitation can lead to full system takeover.
CVE-2017-8748 Buffer Overflow in microsoft (CVE-2017-8748)
vulnerability in microsoft (CVE-2017-8748). Successful exploitation can lead to full system takeover.
CVE-2017-8749 Buffer Overflow in microsoft (CVE-2017-8749)
vulnerability in microsoft (CVE-2017-8749). Successful exploitation can lead to full system takeover.
CVE-2017-8750 Buffer Overflow in microsoft (CVE-2017-8750)
vulnerability in microsoft (CVE-2017-8750). Successful exploitation can lead to full system takeover.
CVE-2017-8681 Information Disclosure in microsoft (CVE-2017-8681)
vulnerability in microsoft (CVE-2017-8681). Confidential information can be exposed externally.
CVE-2017-8680 Information Disclosure in microsoft (CVE-2017-8680)
vulnerability in microsoft (CVE-2017-8680). Confidential information can be exposed externally.
CVE-2017-8682 Vulnerability in microsoft (CVE-2017-8682)
vulnerability in microsoft (CVE-2017-8682). Successful exploitation can lead to full system takeover.
CVE-2017-8683 Information Disclosure in microsoft (CVE-2017-8683)
vulnerability in microsoft (CVE-2017-8683). Confidential information can be exposed externally.
CVE-2017-8684 Information Disclosure in microsoft (CVE-2017-8684)
vulnerability in microsoft (CVE-2017-8684). Confidential information can be exposed externally.
CVE-2017-8685 Information Disclosure in microsoft (CVE-2017-8685)
vulnerability in microsoft (CVE-2017-8685). Confidential information can be exposed externally.
CVE-2017-8687 Information Disclosure in microsoft (CVE-2017-8687)
vulnerability in microsoft (CVE-2017-8687). Confidential information can be exposed externally.
CVE-2017-8695 Information Disclosure in microsoft (CVE-2017-8695)
vulnerability in microsoft (CVE-2017-8695). Confidential information can be exposed externally.
CVE-2017-8696 Buffer Overflow in microsoft (CVE-2017-8696)
vulnerability in microsoft (CVE-2017-8696). Successful exploitation can lead to full system takeover.
CVE-2017-8699 Vulnerability in microsoft (CVE-2017-8699)
vulnerability in microsoft (CVE-2017-8699). Successful exploitation can lead to full system takeover.
CVE-2017-8708 Information Disclosure in microsoft (CVE-2017-8708)
vulnerability in microsoft (CVE-2017-8708). Confidential information can be exposed externally.
CVE-2017-8709 Information Disclosure in microsoft (CVE-2017-8709)
vulnerability in microsoft (CVE-2017-8709). Confidential information can be exposed externally.
CVE-2017-8710 XXE (XML External Entity) in microsoft (CVE-2017-8710)
vulnerability in microsoft (CVE-2017-8710). Confidential information can be exposed externally.
CVE-2017-8688 Information Disclosure in microsoft (CVE-2017-8688)
vulnerability in microsoft (CVE-2017-8688). Confidential information can be exposed externally.
CVE-2017-8675 Buffer Overflow in microsoft (CVE-2017-8675)
vulnerability in microsoft (CVE-2017-8675). Successful exploitation can lead to full system takeover.
CVE-2017-8628 Vulnerability in microsoft (CVE-2017-8628)
vulnerability in microsoft (CVE-2017-8628). Confidential information can be exposed externally.
CVE-2017-8676 Information Disclosure in microsoft (CVE-2017-8676)
vulnerability in microsoft (CVE-2017-8676). Risk of unauthorized operations or information disclosure.
CVE-2017-8678 Information Disclosure in microsoft (CVE-2017-8678)
vulnerability in microsoft (CVE-2017-8678). Confidential information can be exposed externally.
CVE-2017-8677 Information Disclosure in microsoft (CVE-2017-8677)
vulnerability in microsoft (CVE-2017-8677). Confidential information can be exposed externally.
CVE-2017-8679 Information Disclosure in microsoft (CVE-2017-8679)
vulnerability in microsoft (CVE-2017-8679). Confidential information can be exposed externally.
CVE-2017-0161 Vulnerability in microsoft (CVE-2017-0161)
vulnerability in microsoft (CVE-2017-0161). Successful exploitation can lead to full system takeover.
CVE-2017-3756 Vulnerability in privilege-escalation (CVE-2017-3756)
vulnerability in privilege-escalation (CVE-2017-3756). Successful exploitation can lead to full system takeover.
CVE-2017-8668 Information Disclosure in microsoft (CVE-2017-8668)
vulnerability in microsoft (CVE-2017-8668). Confidential information can be exposed externally.
CVE-2017-8653 Buffer Overflow in microsoft (CVE-2017-8653)
vulnerability in microsoft (CVE-2017-8653). Successful exploitation can lead to full system takeover.
CVE-2017-8641 Buffer Overflow in microsoft (CVE-2017-8641)
vulnerability in microsoft (CVE-2017-8641). Successful exploitation can lead to full system takeover.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →