Msrc Windows 7 vulnerabilities
1,628 known vulnerabilities affecting msrc/windows_7.
Total CVEs
1,628
CISA KEV
72
actively exploited
Public exploits
162
Exploited in wild
82
Severity breakdown
CRITICAL24HIGH1098MEDIUM487LOW19
Vulnerabilities
Page 22 of 82
CVE-2021-36959MEDIUMCVSS 5.52021-09-14
CVE-2021-36959 [MEDIUM] Windows Authenticode Spoofing Vulnerability
Windows Authenticode Spoofing Vulnerability
Windows Authenticode: Windows Authenticode
Microsoft: Microsoft
Impact: Spoofing
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568
Reference: https://support.microsoft.com/help/5005568
Reference:
msrc
CVE-2021-26424CRITICALCVSS 9.92021-08-10
CVE-2021-26424 [CRITICAL] Windows TCP/IP Remote Code Execution Vulnerability
Windows TCP/IP Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
This vulnerability is remotely triggerable by a malicious Hyper-V guest that sends an ipv6 ping to the Hyper-V host. An attacker could send a specially crafted TCPIP packet to its host utilizing the TCPIP Protocol Stack (tcpip.sys) to process packets.
Is this attack specific to Hyper-V or applicable to all hypervis
msrc
CVE-2021-36947HIGHCVSS 8.82021-08-10
CVE-2021-36947 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030
Re
msrc
CVE-2021-34483HIGHCVSS 7.82021-08-10
CVE-2021-34483 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030
msrc
CVE-2021-34535HIGHCVSS 8.82021-08-10
CVE-2021-34535 [HIGH] Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
FAQ: How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.
In the case of Hyper-V, a malicious program running in a gues
msrc
CVE-2021-34537HIGHCVSS 7.82021-08-10
CVE-2021-34537 [HIGH] Windows Bluetooth Driver Elevation of Privilege Vulnerability
Windows Bluetooth Driver Elevation of Privilege Vulnerability
FAQ: How could an attacker exploit this vulnerability?
An authorized attacker could exploit the Windows Bluetooth driver vulnerability by programatically running certain functions that could lead to elevation of privilege on the Bluetooth component.
Windows Bluetooth Service: Windows Bluetooth Service
Microsoft: Microsoft
Impact: Elevation of Privi
msrc
CVE-2021-34484HIGHCVSS 7.8KEVPoC2021-08-10
CVE-2021-34484 [HIGH] Windows User Profile Service Elevation of Privilege Vulnerability
Windows User Profile Service Elevation of Privilege Vulnerability
Windows User Profile Service: Windows User Profile Service
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB50
msrc
CVE-2021-34533HIGHCVSS 7.82021-08-10
CVE-2021-34533 [HIGH] Windows Graphics Component Font Parsing Remote Code Execution Vulnerability
Windows Graphics Component Font Parsing Remote Code Execution Vulnerability
Microsoft Graphics Component: Microsoft Graphics Component
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site
msrc
CVE-2021-36958HIGHCVSS 7.82021-08-10
CVE-2021-36958 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user
msrc
CVE-2021-26425HIGHCVSS 7.82021-08-10
CVE-2021-26425 [HIGH] Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing Elevation of Privilege Vulnerability
Windows Event Tracing: Windows Event Tracing
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030
Reference: https://su
msrc
CVE-2021-36936HIGHCVSS 8.82021-08-10
CVE-2021-36936 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Components: Windows Print Spooler Components
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;Older Software Release:Exploitation More Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030
R
msrc
CVE-2021-36937HIGHCVSS 7.82021-08-10
CVE-2021-36937 [HIGH] Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability
Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability
Microsoft Windows Codecs Library: Microsoft Windows Codecs Library
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/S
msrc
CVE-2021-34480MEDIUMCVSS 6.82021-08-10
CVE-2021-34480 [MEDIUM] Scripting Engine Memory Corruption Vulnerability
Scripting Engine Memory Corruption Vulnerability
FAQ: According to the CVSS, User Interaction is Required. What interaction would the user have to do?
Exploitation of the vulnerability requires that a user open a specially crafted file.
In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
In a web-based attack s
msrc
CVE-2021-34481HIGHCVSS 8.82021-07-13
CVE-2021-34481 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user
msrc
CVE-2021-34441HIGHCVSS 7.82021-07-13
CVE-2021-34441 [HIGH] Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Microsoft Windows Media Foundation: Microsoft Windows Media Foundation
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/si
msrc
CVE-2021-33749HIGHCVSS 8.82021-07-13
CVE-2021-33749 [HIGH] Windows DNS Snap-in Remote Code Execution Vulnerability
Windows DNS Snap-in Remote Code Execution Vulnerability
FAQ: How could an attacker exploit the vulnerability?
An administrator would need to view a malicious record in the DNS Snap-in to allow exploitation this vulnerability.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older
msrc
CVE-2021-31183HIGHCVSS 7.52021-07-13
CVE-2021-31183 [HIGH] Windows TCP/IP Driver Denial of Service Vulnerability
Windows TCP/IP Driver Denial of Service Vulnerability
Windows TCP/IP: Windows TCP/IP
Microsoft: Microsoft
Impact: Denial of Service
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.microsoft.com/help/5004
msrc
CVE-2021-34511HIGHCVSS 7.82021-07-13
CVE-2021-34511 [HIGH] Windows Installer Elevation of Privilege Vulnerability
Windows Installer Elevation of Privilege Vulnerability
Windows Installer: Windows Installer
Microsoft: Microsoft
Impact: Elevation of Privilege
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.microsoft.
msrc
CVE-2021-34504HIGHCVSS 7.82021-07-13
CVE-2021-34504 [HIGH] Windows Address Book Remote Code Execution Vulnerability
Windows Address Book Remote Code Execution Vulnerability
Windows Address Book: Windows Address Book
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A
Reference: https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004244
Reference: https://support.m
msrc
CVE-2021-33750HIGHCVSS 8.82021-07-13
CVE-2021-33750 [HIGH] Windows DNS Snap-in Remote Code Execution Vulnerability
Windows DNS Snap-in Remote Code Execution Vulnerability
FAQ: How could an attacker exploit the vulnerability?
An administrator would need to view a malicious record in the DNS Snap-in to allow exploitation this vulnerability.
Role: DNS Server: Role: DNS Server
Microsoft: Microsoft
Impact: Remote Code Execution
Exploit Status: Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older
msrc