cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-26903,https://securityvulnerability.io/vulnerability/CVE-2022-26903,Windows Graphics Component Remote Code Execution Vulnerability,Windows Graphics Component Remote Code Execution Vulnerability,Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1909,Windows 10 Version 21h1,Windows Server 2022,Windows 10 Version 20h2,Windows Server Version 20h2,Windows 10 Version 21h2,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Microsoft Excel For Android,Microsoft Powerpoint For Android,Microsoft Word For Android,Microsoft Word Mobile,Microsoft Excel Mobile,Microsoft Powerpoint Mobile",7.8,HIGH,0.016750000417232513,false,false,false,false,,false,false,2022-04-15T19:05:40.000Z,0 CVE-2020-1223,https://securityvulnerability.io/vulnerability/CVE-2020-1223,,"A remote code execution vulnerability exists when Microsoft Word for Android fails to properly handle certain files.To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted URL file.The update addresses the vulnerability by correcting how Microsoft Word for Android handles specially crafted URL files., aka 'Word for Android Remote Code Execution Vulnerability'.",Microsoft,Microsoft Word For Android,8.8,HIGH,0.06233999878168106,false,false,false,false,,false,false,2020-06-09T19:43:30.000Z,0