cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-36420,https://securityvulnerability.io/vulnerability/CVE-2023-36420,Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability,"A vulnerability exists in the Microsoft ODBC Driver for SQL Server that allows remote code execution. An attacker exploiting this vulnerability could execute arbitrary code on the victim's system, potentially leading to a compromise of sensitive data and system integrity. It is crucial for users to apply the latest security patches to safeguard their systems against potential exploits.",Microsoft,"Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Sql Server 2022 (cu 8),Microsoft Sql Server 2019 (cu 22)",7.8,HIGH,0.0023900000378489494,false,,false,false,false,,,false,false,,2023-10-10T18:15:00.000Z,0 CVE-2023-36785,https://securityvulnerability.io/vulnerability/CVE-2023-36785,Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability,"The Microsoft ODBC Driver for SQL Server has a vulnerability that could allow an attacker to execute arbitrary code on the system running the affected driver. This may occur when the driver improperly handles certain requests. If exploited, this vulnerability could enable an attacker to gain unauthorized control over the affected system and potentially access sensitive data. Organizations using the impacted ODBC Driver should apply the provided security updates promptly to mitigate risks.",Microsoft,"Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Sql Server 2019 (cu 22),Microsoft Sql Server 2022 (cu 8)",7.8,HIGH,0.002240000059828162,false,,false,false,false,,,false,false,,2023-10-10T18:15:00.000Z,0 CVE-2023-36730,https://securityvulnerability.io/vulnerability/CVE-2023-36730,Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability,"A remote code execution vulnerability exists in the Microsoft ODBC Driver for SQL Server when the driver improperly handles requests. An authenticated attacker could exploit this vulnerability to execute arbitrary code on the target system. Successful exploitation could allow the attacker to view, modify, or delete data, or create new accounts with full user rights. To mitigate this risk, organizations should apply relevant updates and monitor their systems for unusual activity.",Microsoft,"Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2022 (gdr),Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS,Microsoft Sql Server 2022 (cu 8),Microsoft Sql Server 2019 (cu 22)",7.8,HIGH,0.002240000059828162,false,,false,false,false,,,false,false,,2023-10-10T18:15:00.000Z,0 CVE-2023-36728,https://securityvulnerability.io/vulnerability/CVE-2023-36728,Microsoft SQL Server Denial of Service Vulnerability,Microsoft SQL Server Denial of Service Vulnerability,Microsoft,"Microsoft Sql Server 2019 (cu 22),Microsoft Sql Server 2022 (cu 8),Microsoft Sql Server 2017 (gdr),Microsoft Sql Server 2014 Service Pack 3 (gdr),Microsoft Sql Server 2014 Service Pack 3 (cu 4),Microsoft Sql Server 2019 (gdr),Microsoft Sql Server 2016 Service Pack 3 (gdr),Microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack,Microsoft Sql Server 2017 (cu 31),Microsoft Sql Server 2022 (gdr),Microsoft Ole Db Driver 19 For Sql Server,Microsoft Ole Db Driver 18 For Sql Server,Microsoft Odbc Driver 17 For Sql Server On Windows,Microsoft Odbc Driver 17 For Sql Server On Linux,Microsoft Odbc Driver 17 For Sql Server On Mac OS,Microsoft Odbc Driver 18 For Sql Server On Windows,Microsoft Odbc Driver 18 For Sql Server On Linux,Microsoft Odbc Driver 18 For Sql Server On Mac OS",5.5,MEDIUM,0.0005099999834783375,false,,false,false,false,,,false,false,,2023-10-10T18:15:00.000Z,0 CVE-2018-7250,https://securityvulnerability.io/vulnerability/CVE-2018-7250,,"An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. An uninitialized kernel pool allocation in IOCTL 0xCA002813 allows a local unprivileged attacker to leak 16 bits of uninitialized kernel PagedPool data.",Microsoft,"Windows Vista,Windows 8.1,Windows 7,Windows 8",5.5,MEDIUM,0.0006900000153109431,false,,false,false,true,2018-02-21T20:47:39.000Z,true,false,false,,2018-02-26T20:00:00.000Z,0 CVE-2018-7249,https://securityvulnerability.io/vulnerability/CVE-2018-7249,,"An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. Two carefully timed calls to IOCTL 0xCA002813 can cause a race condition that leads to a use-after-free. When exploited, an unprivileged attacker can run arbitrary code in the kernel.",Microsoft,"Windows Vista,Windows 8.1,Windows 7,Windows 8",7,HIGH,0.0006900000153109431,false,,false,false,true,2018-02-21T20:31:09.000Z,true,false,false,,2018-02-26T20:00:00.000Z,0 CVE-2016-0008,https://securityvulnerability.io/vulnerability/CVE-2016-0008,,"The graphics device interface in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka ""Windows GDI32.dll ASLR Bypass Vulnerability.""",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",4.3,MEDIUM,0.05352000147104263,false,,false,false,false,,,false,false,,2016-01-13T02:00:00.000Z,0 CVE-2016-0018,https://securityvulnerability.io/vulnerability/CVE-2016-0018,,"Microsoft Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 R2, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka ""DLL Loading Remote Code Execution Vulnerability.""",Microsoft,"Windows Server 2012,Windows 10,Windows 8.1,Windows 7,Windows 8",7.3,HIGH,0.09606000036001205,false,,false,false,false,,,false,false,,2016-01-13T02:00:00.000Z,0 CVE-2016-0007,https://securityvulnerability.io/vulnerability/CVE-2016-0007,,"The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka ""Windows Mount Point Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2016-0006.",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",7.8,HIGH,0.002309999894350767,false,,false,false,false,,,false,false,,2016-01-13T02:00:00.000Z,0 CVE-2016-0014,https://securityvulnerability.io/vulnerability/CVE-2016-0014,,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka ""DLL Loading Elevation of Privilege Vulnerability.""",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2016-01-13T02:00:00.000Z,0 CVE-2016-0006,https://securityvulnerability.io/vulnerability/CVE-2016-0006,,"The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka ""Windows Mount Point Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2016-0007.",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",7.3,HIGH,0.0028699999675154686,false,,false,false,false,,,false,false,,2016-01-13T02:00:00.000Z,0 CVE-2016-0016,https://securityvulnerability.io/vulnerability/CVE-2016-0016,,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka ""DLL Loading Remote Code Execution Vulnerability.""",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",7.8,HIGH,0.5720800161361694,false,,false,false,false,,,false,false,,2016-01-13T02:00:00.000Z,0 CVE-2016-0015,https://securityvulnerability.io/vulnerability/CVE-2016-0015,,"DirectShow in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted file, aka ""DirectShow Heap Corruption Remote Code Execution Vulnerability.""",Microsoft,"Windows Server 2008,Windows Server 2012,Windows 10,Windows 8.1,Windows 7,Windows Vista,Windows 8",7.8,HIGH,0.8789299726486206,false,,false,false,false,,,false,false,,2016-01-13T02:00:00.000Z,0 CVE-2015-6171,https://securityvulnerability.io/vulnerability/CVE-2015-6171,,"The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka ""Windows Kernel Memory Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2015-6173 and CVE-2015-6174.",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2015-12-09T11:00:00.000Z,0 CVE-2015-6173,https://securityvulnerability.io/vulnerability/CVE-2015-6173,,"The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka ""Windows Kernel Memory Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2015-6171 and CVE-2015-6174.",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2015-12-09T11:00:00.000Z,0 CVE-2015-6131,https://securityvulnerability.io/vulnerability/CVE-2015-6131,,"Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows remote attackers to execute arbitrary code via a crafted .mcl file, aka ""Media Center Library Parsing RCE Vulnerability.""",Microsoft,"Windows 8.1,Windows 7,Windows Vista,Windows 8",,,0.6990100145339966,false,,false,false,false,,,false,false,,2015-12-09T11:00:00.000Z,0 CVE-2015-6174,https://securityvulnerability.io/vulnerability/CVE-2015-6174,,"The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka ""Windows Kernel Memory Elevation of Privilege Vulnerability,"" a different vulnerability than CVE-2015-6171 and CVE-2015-6173.",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2015-12-09T11:00:00.000Z,0 CVE-2015-6133,https://securityvulnerability.io/vulnerability/CVE-2015-6133,,"Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka ""Windows Library Loading Remote Code Execution Vulnerability.""",Microsoft,"Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows Rt 8.1,Windows 8",,,0.27978000044822693,false,,false,false,false,,,false,false,,2015-12-09T11:00:00.000Z,0 CVE-2015-6127,https://securityvulnerability.io/vulnerability/CVE-2015-6127,,"Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows remote attackers to read arbitrary files via a crafted .mcl file, aka ""Windows Media Center Information Disclosure Vulnerability.""",Microsoft,"Windows 8.1,Windows 7,Windows Vista,Windows 8",,,0.819350004196167,false,,false,false,false,,,false,false,,2015-12-09T11:00:00.000Z,0 CVE-2015-6132,https://securityvulnerability.io/vulnerability/CVE-2015-6132,,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka ""Windows Library Loading Remote Code Execution Vulnerability.""",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",,,0.8799200057983398,false,,false,false,true,2016-05-14T14:17:15.000Z,true,false,false,,2015-12-09T11:00:00.000Z,0 CVE-2015-6126,https://securityvulnerability.io/vulnerability/CVE-2015-6126,,"Race condition in the Pragmatic General Multicast (PGM) protocol implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application, aka ""Windows PGM UAF Elevation of Privilege Vulnerability.""",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",,,0.0005300000193528831,false,,false,false,false,,,false,false,,2015-12-09T11:00:00.000Z,0 CVE-2015-6111,https://securityvulnerability.io/vulnerability/CVE-2015-6111,,"IPSec in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles encryption negotiation, which allows remote authenticated users to cause a denial of service (system hang) via crafted IP traffic, aka ""Windows IPSec Denial of Service Vulnerability.""",Microsoft,"Windows Server 2012,Windows Rt,Windows 8.1,Windows Rt 8.1,Windows 8,Windows 10",,,0.002309999894350767,false,,false,false,false,,,false,false,,2015-11-11T11:00:00.000Z,0 CVE-2015-6104,https://securityvulnerability.io/vulnerability/CVE-2015-6104,,"The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted embedded font, aka ""Windows Graphics Memory Remote Code Execution Vulnerability,"" a different vulnerability than CVE-2015-6103.",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",,,0.25685998797416687,false,,false,false,false,,,false,false,,2015-11-11T11:00:00.000Z,0 CVE-2015-6112,https://securityvulnerability.io/vulnerability/CVE-2015-6112,,"SChannel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 lacks the required extended master-secret binding support to ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a ""triple handshake attack,"" aka ""Schannel TLS Triple Handshake Vulnerability.""",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",,,0.0019099999917671084,false,,false,false,false,,,false,false,,2015-11-11T11:00:00.000Z,0 CVE-2015-6102,https://securityvulnerability.io/vulnerability/CVE-2015-6102,,"The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka ""Windows Kernel Memory Information Disclosure Vulnerability.""",Microsoft,"Windows Server 2008,Windows Server 2012,Windows Rt,Windows 10,Windows 8.1,Windows 7,Windows Rt 8.1,Windows Vista,Windows 8",,,0.8468700051307678,false,,false,false,false,,,false,false,,2015-11-11T11:00:00.000Z,0