Msrc Windows 7 vulnerabilities
1,628 known vulnerabilities affecting msrc/windows_7.
Total CVEs
1,628
CISA KEV
72
actively exploited
Public exploits
162
Exploited in wild
82
Severity breakdown
CRITICAL24HIGH1098MEDIUM487LOW19
Vulnerabilities
Page 72 of 82
CVE-2017-8467HIGHCVSS 7.02017-07-11
CVE-2017-8467 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8578HIGHCVSS 7.02017-07-11
CVE-2017-8578 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8573HIGHCVSS 7.02017-07-11
CVE-2017-8573 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8565HIGHCVSS 7.52017-07-11
CVE-2017-8565 [HIGH] Windows PowerShell Remote Code Execution Vulnerability
Windows PowerShell Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in PowerShell when PSObject wraps a CIM Instance. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system.
In an attack scenario, an attacker could execute malicious code in a PowerShell remote session.
The update addresses the vulnerability by correcting
msrc
CVE-2017-8563HIGHCVSS 7.52017-07-11
CVE-2017-8563 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully forward an authentication request to a Windows LDAP server, such as a system running Active Directory Domain Services (AD DS) or Active Directory Lightweight Directory Services (AD LDS), which has been configured to require signing or sealing on inc
msrc
CVE-2017-8577HIGHCVSS 7.02017-07-11
CVE-2017-8577 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8581HIGHCVSS 7.02017-07-11
CVE-2017-8581 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2017-8495HIGHCVSS 7.52017-07-11
CVE-2017-8495 [HIGH] Kerberos SNAME Security Feature Bypass Vulnerability
Kerberos SNAME Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists in Microsoft Windows when Kerberos fails to prevent tampering with the SNAME field during ticket exchange. An attacker who successfully exploited this vulnerability could use it to bypass Extended Protection for Authentication.
To exploit this vulnerability, an attacker would have to be able to launch a man-in-
msrc
CVE-2017-8590HIGHCVSS 8.82017-07-11
CVE-2017-8590 [HIGH] Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
To exploit the vulnerability, an attacker would first have to log on to th
msrc
CVE-2017-8580HIGHCVSS 7.02017-07-11
CVE-2017-8580 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an
msrc
CVE-2017-8582MEDIUMCVSS 5.92017-07-11
CVE-2017-8582 [MEDIUM] Http.sys Information Disclosure Vulnerability
Http.sys Information Disclosure Vulnerability
Description: An Information Disclosure vulnerability exists when the HTTP.sys server application component improperly handles objects in memory.
An attacker who successfully exploited this vulnerability could obtain information to further compromise the HTTP.sys server application system.
A remote unauthenticated attacker could exploit this vulnerability by issuing a request to the
msrc
CVE-2017-8592MEDIUMCVSS 5.42017-07-11
CVE-2017-8592 [MEDIUM] Microsoft Browser Security Feature Bypass Vulnerability
Microsoft Browser Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists when Microsoft browsers improperly handle redirect requests. The vulnerability allows Microsoft browsers to bypass CORS redirect restrictions, and to follow redirect requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force the browser to send data t
msrc
CVE-2017-8587MEDIUMCVSS 6.52017-07-11
CVE-2017-8587 [MEDIUM] Windows Explorer Denial of Service Vulnerability
Windows Explorer Denial of Service Vulnerability
Description: An Denial Of Service vulnerability exists when Windows Explorer attempts to open a non-existent file. An attacker who successfully exploited this vulnerability could cause a denial of service.
A attacker could exploit this vulnerability by hosting a specially crafted web site and convince a user to browse to the page, containing the reference to the non-existing
msrc
CVE-2017-8557MEDIUMCVSS 5.52017-07-11
CVE-2017-8557 [MEDIUM] Windows System Information Console Information Disclosure Vulnerability
Windows System Information Console Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists in the Microsoft Common Console Document (.msc) when it improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration.
To exploit
msrc
CVE-2017-0170MEDIUMCVSS 5.52017-07-11
CVE-2017-0170 [MEDIUM] Windows Performance Monitor Information Disclosure Vulnerability
Windows Performance Monitor Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists in the Windows Performance Monitor Console when it improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration.
To exploit the vulnerability,
msrc
CVE-2017-8463MEDIUMCVSS 6.32017-07-11
CVE-2017-8463 [HIGH] Windows Explorer Remote Code Execution Vulnerability
Windows Explorer Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Windows Explorer improperly handles executable files and shares during rename operations. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another user. Users not running as administrators would be less affected.
To exploit this vulnerability, an attacker w
msrc
CVE-2017-8486MEDIUMCVSS 4.72017-07-11
CVE-2017-8486 [MEDIUM] Win32k Information Disclosure Vulnerability
Win32k Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit the vulnerability, an attacker would have to either log on locally to an affected system, or convince a locally authenticated us
msrc
CVE-2017-8588MEDIUMCVSS 6.72017-07-11
CVE-2017-8588 [HIGH] WordPad Remote Code Execution Vulnerability
WordPad Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in the way that Microsoft WordPad parses specially crafted files.
Exploitation of this vulnerability requires that a user open a specially crafted file with an affected version of Microsoft WordPad. In an email attack scenario, an attacker could exploit the vulnerability by sending a specially crafted file to the user and then con
msrc
CVE-2017-8564MEDIUMCVSS 4.7PoC2017-07-11
CVE-2017-8564 [MEDIUM] Windows Kernel Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted app
msrc
CVE-2017-8464HIGHCVSS 7.5KEVPoC2017-06-13
CVE-2017-8464 [HIGH] LNK Remote Code Execution Vulnerability
LNK Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.
An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative
msrc