cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2012-5362,https://securityvulnerability.io/vulnerability/CVE-2012-5362,,"The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2010-4669.",Microsoft,"Windows 7,Windows Vista,Windows Xp,Windows Server 2003",7.5,HIGH,0.00203999993391335,false,false,false,false,,false,false,2020-02-20T14:22:34.000Z,0 CVE-2012-5364,https://securityvulnerability.io/vulnerability/CVE-2012-5364,,The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.,Microsoft,"Windows 7,Windows Vista,Windows Xp,Windows Server 2003",7.5,HIGH,0.00203999993391335,false,false,false,false,,false,false,2020-02-20T14:16:52.000Z,0 CVE-2018-7249,https://securityvulnerability.io/vulnerability/CVE-2018-7249,,"An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. Two carefully timed calls to IOCTL 0xCA002813 can cause a race condition that leads to a use-after-free. When exploited, an unprivileged attacker can run arbitrary code in the kernel.",Microsoft,"Windows Vista,Windows 8.1,Windows 7,Windows 8",7,HIGH,0.0006900000153109431,false,false,false,true,true,false,false,2018-02-26T20:00:00.000Z,0 CVE-2018-7250,https://securityvulnerability.io/vulnerability/CVE-2018-7250,,"An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. An uninitialized kernel pool allocation in IOCTL 0xCA002813 allows a local unprivileged attacker to leak 16 bits of uninitialized kernel PagedPool data.",Microsoft,"Windows Vista,Windows 8.1,Windows 7,Windows 8",5.5,MEDIUM,0.0006900000153109431,false,false,false,true,true,false,false,2018-02-26T20:00:00.000Z,0 CVE-2017-0120,https://securityvulnerability.io/vulnerability/CVE-2017-0120,,"Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka ""Windows Uniscribe Information Disclosure Vulnerability.""",Microsoft,"Uniscribe In Microsoft Windows Vista Sp2, Windows Server 2008 Sp2, And R2 Sp1, And Windows 7 Sp1.",4.3,MEDIUM,0.14048999547958374,false,false,false,false,,false,false,2017-03-17T00:00:00.000Z,0 CVE-2017-0074,https://securityvulnerability.io/vulnerability/CVE-2017-0074,,"Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka ""Hyper-V Denial of Service Vulnerability."" This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0076, CVE-2017-0097, and CVE-2017-0099.",Microsoft,"Hyper-v In Microsoft Windows Vista Sp2; Windows Server 2008 Sp2 And 2008 R2; Windows 7 Sp1; Windows 8.1; Windows Server 2012 And R2; Windows 10, 1511, And 1607; And Windows Server 2016.",5.4,MEDIUM,0.0008299999753944576,false,false,false,false,,false,false,2017-03-17T00:00:00.000Z,0 CVE-2017-0004,https://securityvulnerability.io/vulnerability/CVE-2017-0004,,"The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to cause a denial of service (reboot) via a crafted authentication request, aka ""Local Security Authority Subsystem Service Denial of Service Vulnerability.""",Microsoft,"Windows Server 2008,Windows 7,Windows Vista",7.5,HIGH,0.9417499899864197,false,false,false,false,,false,false,2017-01-10T21:00:00.000Z,0 CVE-2016-7295,https://securityvulnerability.io/vulnerability/CVE-2016-7295,,"The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to obtain sensitive information from process memory via a crafted application, aka ""Windows Common Log File System Driver Information Disclosure Vulnerability.""",Microsoft,"Windows Server 2012,Windows 10,Windows Server 2016,Windows 8.1,Windows Server 2008,Windows 7,Windows Rt 8.1,Windows Vista",5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2016-12-20T05:54:00.000Z,0 CVE-2016-7274,https://securityvulnerability.io/vulnerability/CVE-2016-7274,,"Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka ""Windows Uniscribe Remote Code Execution Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows Server 2016,Windows 7,Windows 10,Windows 8.1,Windows Server 2008,Windows Vista",8.8,HIGH,0.4392400085926056,false,false,false,false,,false,false,2016-12-20T05:54:00.000Z,0 CVE-2016-7272,https://securityvulnerability.io/vulnerability/CVE-2016-7272,,"The Graphics component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka ""Windows Graphics Remote Code Execution Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows Server 2016,Windows 7,Windows 10,Windows 8.1,Windows Server 2008,Windows Vista",8.8,HIGH,0.8842099905014038,false,false,false,false,,false,false,2016-12-20T05:54:00.000Z,0 CVE-2016-7259,https://securityvulnerability.io/vulnerability/CVE-2016-7259,,"The Graphics Component in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka ""Win32k Elevation of Privilege Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows Server 2016,Windows 7,Windows 10,Windows 8.1,Windows Server 2008,Windows Vista",7.8,HIGH,0.00044999999227002263,false,false,false,false,,false,false,2016-12-20T05:54:00.000Z,0 CVE-2016-7219,https://securityvulnerability.io/vulnerability/CVE-2016-7219,,"The Crypto driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to obtain sensitive information via a crafted application, aka ""Windows Crypto Driver Information Disclosure Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows Server 2016,Windows 7,Windows 10,Windows 8.1,Windows Server 2008,Windows Vista",5.5,MEDIUM,0.00215000007301569,false,false,false,false,,false,false,2016-12-20T05:54:00.000Z,0 CVE-2016-7260,https://securityvulnerability.io/vulnerability/CVE-2016-7260,,"The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka ""Win32k Elevation of Privilege Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows Server 2016,Windows 7,Windows 10,Windows 8.1,Windows Server 2008,Windows Vista",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2016-12-20T05:54:00.000Z,0 CVE-2016-7292,https://securityvulnerability.io/vulnerability/CVE-2016-7292,,"The Installer in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 mishandles library loading, which allows local users to gain privileges via a crafted application, aka ""Windows Installer Elevation of Privilege Vulnerability.""",Microsoft,"Windows Server 2012,Windows 10,Windows Server 2016,Windows 8.1,Windows Server 2008,Windows 7,Windows Rt 8.1,Windows Vista",7.8,HIGH,0.0017900000093504786,false,false,false,false,,false,false,2016-12-20T05:54:00.000Z,0 CVE-2016-7257,https://securityvulnerability.io/vulnerability/CVE-2016-7257,,"The GDI component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office for Mac 2011, and Office 2016 for Mac allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka ""GDI Information Disclosure Vulnerability.""",Microsoft,"Office For Mac,Windows 7,Windows Server 2008,Windows Vista",6.5,MEDIUM,0.017580000683665276,false,false,false,false,,false,false,2016-12-20T05:54:00.000Z,0 CVE-2016-7212,https://securityvulnerability.io/vulnerability/CVE-2016-7212,,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow remote attackers to execute arbitrary code via a crafted image file, aka ""Windows Remote Code Execution Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows Server 2016,Windows 7,Windows 10,Windows 8.1,Windows Server 2008,Windows Vista",7.8,HIGH,0.9228100180625916,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0 CVE-2016-7210,https://securityvulnerability.io/vulnerability/CVE-2016-7210,,"atmfd.dll in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to obtain sensitive information from process memory via a crafted Open Type font on a web site, aka ""Open Type Font Information Disclosure Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows 7,Windows 10,Windows Server 2016,Windows 8.1,Windows Server 2008,Windows Vista",6.5,MEDIUM,0.017710000276565552,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0 CVE-2016-7214,https://securityvulnerability.io/vulnerability/CVE-2016-7214,,"The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to bypass the ASLR protection mechanism via a crafted application, aka ""Win32k Information Disclosure Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows Server 2016,Windows 7,Windows 10,Windows 8.1,Windows Server 2008,Windows Vista",3.3,LOW,0.000859999970998615,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0 CVE-2016-7184,https://securityvulnerability.io/vulnerability/CVE-2016-7184,,"The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka ""Windows Common Log File System Driver Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3334, CVE-2016-3335, CVE-2016-3338, CVE-2016-3340, CVE-2016-3342, and CVE-2016-3343.",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows 7,Windows 10,Windows Server 2016,Windows 8.1,Windows Server 2008,Windows Vista",7.8,HIGH,0.004029999952763319,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0 CVE-2016-3332,https://securityvulnerability.io/vulnerability/CVE-2016-3332,,"The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka ""Windows Common Log File System Driver Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2016-0026, CVE-2016-3333, CVE-2016-3334, CVE-2016-3335, CVE-2016-3338, CVE-2016-3340, CVE-2016-3342, CVE-2016-3343, and CVE-2016-7184.",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows 7,Windows 10,Windows Server 2016,Windows 8.1,Windows Server 2008,Windows Vista",7.8,HIGH,0.004029999952763319,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0 CVE-2016-3340,https://securityvulnerability.io/vulnerability/CVE-2016-3340,,"The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka ""Windows Common Log File System Driver Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3334, CVE-2016-3335, CVE-2016-3338, CVE-2016-3342, CVE-2016-3343, and CVE-2016-7184.",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows 7,Windows 10,Windows Server 2016,Windows 8.1,Windows Server 2008,Windows Vista",7.8,HIGH,0.004029999952763319,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0 CVE-2016-7215,https://securityvulnerability.io/vulnerability/CVE-2016-7215,,"The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka ""Win32k Elevation of Privilege Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows Server 2016,Windows 7,Windows 10,Windows 8.1,Windows Server 2008,Windows Vista",7.8,HIGH,0.0015200000489130616,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0 CVE-2016-7238,https://securityvulnerability.io/vulnerability/CVE-2016-7238,,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 mishandle caching for NTLM password-change requests, which allows local users to gain privileges via a crafted application, aka ""Windows NTLM Elevation of Privilege Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows Server 2016,Windows 7,Windows 10,Windows 8.1,Windows Server 2008,Windows Vista",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0 CVE-2016-3334,https://securityvulnerability.io/vulnerability/CVE-2016-3334,,"The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka ""Windows Common Log File System Driver Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3335, CVE-2016-3338, CVE-2016-3340, CVE-2016-3342, CVE-2016-3343, and CVE-2016-7184.",Microsoft,"Windows Rt 8.1,Windows Server 2012,Windows 7,Windows 10,Windows Server 2016,Windows 8.1,Windows Server 2008,Windows Vista",7.8,HIGH,0.004029999952763319,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0 CVE-2016-7248,https://securityvulnerability.io/vulnerability/CVE-2016-7248,,"Microsoft Video Control in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8.1, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to execute arbitrary code via a crafted file, aka ""Microsoft Video Control Remote Code Execution Vulnerability.""",Microsoft,"Windows Rt 8.1,Windows 7,Windows 10,Windows 8.1,Windows Vista",7.8,HIGH,0.3818899989128113,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0