cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-49071,https://securityvulnerability.io/vulnerability/CVE-2024-49071,Authorized Attacker Can Disclose Sensitive Information Over Network via Index Misconfiguration,Improper authorization of an index that contains sensitive information from a Global Files search in Windows Defender allows an authorized attacker to disclose information over a network.,Microsoft,Microsoft Defender For Endpoint For Windows,6.5,MEDIUM,0.0004900000058114529,false,false,false,false,,false,false,2024-12-12T19:07:50.753Z,0 CVE-2024-20671,https://securityvulnerability.io/vulnerability/CVE-2024-20671,Microsoft Defender Security Feature Bypass Vulnerability,Microsoft Defender Security Feature Bypass Vulnerability,Microsoft,Windows Defender Antimalware Platform,5.5,MEDIUM,0.0005300000193528831,false,false,false,false,,false,false,2024-03-12T16:57:41.405Z,0 CVE-2024-21315,https://securityvulnerability.io/vulnerability/CVE-2024-21315,Elevation of Privilege Vulnerability Affects Microsoft Defender for Endpoint Protection,"An elevation of privilege vulnerability exists in Microsoft Defender for Endpoint Protection, which allows an attacker to gain elevated access to the system. This flaw can lead to unauthorized actions being taken by malicious users, compromising system security and user data. Patching is essential to mitigate any potential exploitation risks associated with this vulnerability.",Microsoft,Microsoft Defender For Endpoint For Windows,7.8,HIGH,0.0006900000153109431,false,false,false,false,,false,false,2024-02-13T18:02:27.519Z,0 CVE-2023-36422,https://securityvulnerability.io/vulnerability/CVE-2023-36422,Microsoft Windows Defender Elevation of Privilege Vulnerability,Microsoft Windows Defender Elevation of Privilege Vulnerability,Microsoft,Windows Defender Antimalware Platform,7.8,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2023-11-14T18:15:00.000Z,0 CVE-2023-38175,https://securityvulnerability.io/vulnerability/CVE-2023-38175,Microsoft Windows Defender Elevation of Privilege Vulnerability,Microsoft Windows Defender Elevation of Privilege Vulnerability,Microsoft,Windows Defender Antimalware Platform,7.8,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2023-08-08T18:15:00.000Z,0 CVE-2022-23278,https://securityvulnerability.io/vulnerability/CVE-2022-23278,Microsoft Defender for Endpoint Spoofing Vulnerability,Microsoft Defender for Endpoint Spoofing Vulnerability,Microsoft,"Microsoft Defender For Endpoint For Linux,Microsoft Defender For Endpoint For Mac,Microsoft Defender For Endpoint For Android,Microsoft Defender For Endpoint For iOS,Microsoft Defender For Endpoint For Windows,Microsoft Defender For Endpoint Edr Sensor",5.9,MEDIUM,0.05527999997138977,false,false,false,false,,false,false,2022-03-09T17:06:57.000Z,0 CVE-2021-24092,https://securityvulnerability.io/vulnerability/CVE-2021-24092,Microsoft Defender Elevation of Privilege Vulnerability,Microsoft Defender Elevation of Privilege Vulnerability,Microsoft,"Microsoft Endpoint Protection,Microsoft System Center Endpoint Protection,Microsoft System Center 2012 R2 Endpoint Protection,Microsoft Security Essentials,Microsoft System Center 2012 Endpoint Protection,Windows Defender",7.8,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2021-02-25T23:01:48.000Z,0 CVE-2021-1647,https://securityvulnerability.io/vulnerability/CVE-2021-1647,Microsoft Defender Remote Code Execution Vulnerability,Microsoft Defender Remote Code Execution Vulnerability,Microsoft,"Microsoft System Center Endpoint Protection,Microsoft System Center 2012 R2 Endpoint Protection,Microsoft Security Essentials,Microsoft System Center 2012 Endpoint Protection,Windows Defender",7.8,HIGH,0.21007999777793884,true,false,false,true,true,false,false,2021-01-12T19:42:01.000Z,0 CVE-2020-1461,https://securityvulnerability.io/vulnerability/CVE-2020-1461,,"An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability'.",Microsoft,"Microsoft Forefront Endpoint Protection,Microsoft System Center,Microsoft Security Essentials,Windows Defender On Windows 10 Version 1909 For 32-bit Systems,Windows Defender On Windows 10 Version 1909 For X64-based Systems,Windows Defender On Windows 10 Version 1909 For Arm64-based Systems,Windows Defender On Windows Server, Version 1909 (server Core Installation),Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2008 For 32-bit Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Server 2012 R2 (server Core Installation)",7.1,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2020-07-14T23:15:00.000Z,0 CVE-2020-1170,https://securityvulnerability.io/vulnerability/CVE-2020-1170,,"An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1163.",Microsoft,"Microsoft Forefront Endpoint Protection,Microsoft System Center,Microsoft Security Essentials,Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1909 For 32-bit Systems,Windows Defender On Windows 10 Version 1909 For X64-based Systems,Windows Defender On Windows 10 Version 1909 For Arm64-based Systems,Windows Defender On Windows Server, Version 1909 (server Core Installation),Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2008 For 32-bit Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0017600000137463212,false,false,false,false,,false,false,2020-06-09T19:43:17.000Z,0 CVE-2020-1163,https://securityvulnerability.io/vulnerability/CVE-2020-1163,,"An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1170.",Microsoft,"Microsoft Forefront Endpoint Protection,Microsoft System Center,Microsoft Security Essentials,Windows Defender On Windows 10 Version 1909 For 32-bit Systems,Windows Defender On Windows 10 Version 1909 For X64-based Systems,Windows Defender On Windows 10 Version 1909 For Arm64-based Systems,Windows Defender On Windows Server, Version 1909 (server Core Installation),Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2008 For 32-bit Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2020-06-09T19:43:17.000Z,0 CVE-2020-1002,https://securityvulnerability.io/vulnerability/CVE-2020-1002,,"An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability'.",Microsoft,"Microsoft Forefront Endpoint Protection,Microsoft System Center,Microsoft Security Essentials,Windows Defender On Windows 10 Version 1909 For 32-bit Systems,Windows Defender On Windows 10 Version 1909 For X64-based Systems,Windows Defender On Windows 10 Version 1909 For Arm64-based Systems,Windows Defender On Windows Server, Version 1909 (server Core Installation),Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2008 For 32-bit Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Server 2012 R2 (server Core Installation)",7.1,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2020-04-15T15:13:20.000Z,0 CVE-2020-0835,https://securityvulnerability.io/vulnerability/CVE-2020-0835,,"An elevation of privilege vulnerability exists when Windows Defender antimalware platform improperly handles hard links, aka 'Windows Defender Antimalware Platform Hard Link Elevation of Privilege Vulnerability'.",Microsoft,Windows Defender Antimalware Platform,7.8,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2020-04-15T15:12:42.000Z,0 CVE-2019-1255,https://securityvulnerability.io/vulnerability/CVE-2019-1255,,"A denial of service vulnerability exists when Microsoft Defender improperly handles files, aka 'Microsoft Defender Denial of Service Vulnerability'.",Microsoft,"Microsoft Security Essentials,Microsoft System Center,Microsoft Forefront Endpoint Protection,Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2012 R2 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 10 Version 1703 For 32-bit Systems,Windows Defender On Windows 10 Version 1703 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 For 32-bit Systems",7.5,HIGH,0.002309999894350767,false,false,false,false,,false,false,2019-09-23T19:14:38.000Z,0 CVE-2019-1161,https://securityvulnerability.io/vulnerability/CVE-2019-1161,Microsoft Defender Elevation of Privilege Vulnerability,"An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted command that could exploit the vulnerability and delete protected files on an affected system once MpSigStub.exe ran again. The update addresses the vulnerability and blocks the arbitrary deletion. ",Microsoft,"Microsoft Forefront Endpoint Protection 2010,Microsoft System Center Endpoint Protection,Microsoft System Center 2012 R2 Endpoint Protection,Microsoft Security Essentials,Microsoft System Center 2012 Endpoint Protection,Windows Defender",7.1,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2019-08-14T20:55:03.000Z,0 CVE-2018-0986,https://securityvulnerability.io/vulnerability/CVE-2018-0986,,"A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption, aka ""Microsoft Malware Protection Engine Remote Code Execution Vulnerability."" This affects Windows Defender, Windows Intune Endpoint Protection, Microsoft Security Essentials, Microsoft System Center Endpoint Protection, Microsoft Exchange Server, Microsoft System Center, Microsoft Forefront Endpoint Protection.",Microsoft,"Windows Defender,Windows Intune Endpoint Protection,Microsoft Security Essentials,Microsoft System Center Endpoint Protection,Microsoft Exchange Server,Microsoft System Center,Microsoft Forefront Endpoint Protection",8.8,HIGH,0.8941799998283386,false,false,false,false,,false,false,2018-04-04T17:00:00.000Z,0 CVE-2013-3154,https://securityvulnerability.io/vulnerability/CVE-2013-3154,,"The signature-update functionality in Windows Defender on Microsoft Windows 7 and Windows Server 2008 R2 relies on an incorrect pathname, which allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory, aka ""Microsoft Windows 7 Defender Improper Pathname Vulnerability.""",Microsoft,"Windows Defender,Windows 7,Windows Server 2008",,,0.00203999993391335,false,false,false,false,,false,false,2013-07-10T01:00:00.000Z,0 CVE-2013-0078,https://securityvulnerability.io/vulnerability/CVE-2013-0078,,"The Microsoft Antimalware Client in Windows Defender on Windows 8 and Windows RT uses an incorrect pathname for MsMpEng.exe, which allows local users to gain privileges via a crafted application, aka ""Microsoft Antimalware Improper Pathname Vulnerability.""",Microsoft,Windows Defender,,,0.0007099999929778278,false,false,false,false,,false,false,2013-04-09T22:00:00.000Z,0 CVE-2011-0037,https://securityvulnerability.io/vulnerability/CVE-2011-0037,,"Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key.",Microsoft,"Forefront Client Security,Windows Defender,Malware Protection Engine,Forefront Endpoint Protection 2010,Windows Live Onecare,Malicious Software Removal Tool,Security Essentials",,,0.0005300000193528831,false,false,false,false,,false,false,2011-02-25T17:00:00.000Z,0 CVE-2008-1438,https://securityvulnerability.io/vulnerability/CVE-2008-1438,,"Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (disk space exhaustion) via a file with ""crafted data structures"" that trigger the creation of large temporary files, a different vulnerability than CVE-2008-1437.",Microsoft,"Forefront Client Security,Windows Defender,Forefront Security For Exchange Server,Antigen For Exchange,Antigen For Smtp Gateway,Malware Protection Engine,Windows Live Onecare,Diagnostics And Recovery Toolkit,Forefront Security For Sharepoint",,,0.2925400137901306,false,false,false,false,,false,false,2008-05-13T22:00:00.000Z,0 CVE-2008-1437,https://securityvulnerability.io/vulnerability/CVE-2008-1437,,"Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (engine hang and restart) via a crafted file, a different vulnerability than CVE-2008-1438.",Microsoft,"Forefront Client Security,Windows Defender,Forefront Security For Exchange Server,Antigen For Exchange,Antigen For Smtp Gateway,Malware Protection Engine,Windows Live Onecare,Diagnostics And Recovery Toolkit,Forefront Security For Sharepoint",,,0.8406699895858765,false,false,false,false,,false,false,2008-05-13T22:00:00.000Z,0 CVE-2006-5270,https://securityvulnerability.io/vulnerability/CVE-2006-5270,,"Integer overflow in the Microsoft Malware Protection Engine (mpengine.dll), as used by Windows Live OneCare, Antigen, Defender, and Forefront Security, allows user-assisted remote attackers to execute arbitrary code via a crafted PDF file.",Microsoft,"Forefront Security,Malware Protection Engine,Windows Defender,Windows Live Onecare,Antigen",,,0.5148800015449524,false,false,false,false,,false,false,2007-02-13T20:00:00.000Z,0