Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 8 - vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2017-8552
A kernel-mode driver in Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, and Windows 8 allows an elevation of privilege when it fails to properly handle objects in memory, aka "Win32k Ele...
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7
9.3
CVSSv2
CVE-2017-0290
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 20...
Microsoft Windows Defender -
Microsoft Forefront Security -
Microsoft Malware Protection Engine
1 EDB exploit
2 Github repositories
2 Articles
7.2
CVSSv2
CVE-2017-0050
The kernel API in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7; Windows 8; Windows 10 Gold, 1511, and 1607; Windows RT 8.1; Windows Server 2012 Gold and R2; and Windows Server 2016 does not properly enforce permissions, which allows local users to sp...
Microsoft Windows Server 2016
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows 10 1607
Microsoft Windows Rt 8.1
Microsoft Windows Vista
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 10 -
Microsoft Windows 10 1511
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
9.3
CVSSv2
CVE-2017-0144
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote malicious users to execute arbitrary code v...
Microsoft Server Message Block 1.0
6 EDB exploits
53 Github repositories
3 Articles
7.2
CVSSv2
CVE-2016-9192
A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local malicious user to install and execute an arbitrary executable file with privileges equivalent to the Microsoft Windows operating system SYSTEM account. More Information: CSC...
Cisco Anyconnect Secure Mobility Client 3.1\\(60\\)
Cisco Anyconnect Secure Mobility Client 4.0\\(64\\)
Cisco Anyconnect Secure Mobility Client 4.0.00048
Cisco Anyconnect Secure Mobility Client 3.1.05187
Cisco Anyconnect Secure Mobility Client 3.1.06073
Cisco Anyconnect Secure Mobility Client 4.0.00051
Cisco Anyconnect Secure Mobility Client 4.0\\(48\\)
Cisco Anyconnect Secure Mobility Client 4.3.00748
Cisco Anyconnect Secure Mobility Client 4.1\\(8\\)
Cisco Anyconnect Secure Mobility Client 4.3.01095
Cisco Anyconnect Secure Mobility Client 4.2.04039
Cisco Anyconnect Secure Mobility Client 3.1.07021
Cisco Anyconnect Secure Mobility Client 4.0\\(2049\\)
Cisco Anyconnect Secure Mobility Client 3.1.05182
Cisco Anyconnect Secure Mobility Client 3.1.02043
Cisco Anyconnect Secure Mobility Client 4.1.0
Cisco Anyconnect Secure Mobility Client 4.0.0
Cisco Anyconnect Secure Mobility Client 4.2.0
Cisco Anyconnect Secure Mobility Client 3.1.0
Cisco Anyconnect Secure Mobility Client 4.3.0
1 Github repository
6.9
CVSSv2
CVE-2016-7165
A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC IT Production Suite (All versions < V7.0 SP1 HFX 2), SIMATIC NET PC-Software (All versions < V14), SIMATIC PCS 7 V7.1 (All versions), SIMATIC PCS 7 V8.0 (All versions), SIM...
Siemens Security Configuration Tool -
Siemens Simit 9.0
Siemens Sinema Server
Siemens Simatic Net Pc Software
Siemens Simatic Step 7
Siemens Simatic Wincc 7.4
Siemens Simatic Wincc 7.3
Siemens Simatic Pcs 7
Siemens Softnet Security Client
Siemens Telecontrol Basic
Siemens Simatic Step 7 \\(tia Portal\\)
Siemens Simatic Wincc \\(tia Portal\\)
Siemens Simatic Wincc 7.2
Siemens Simatic Wincc 7.0
Siemens Simatic It Production Suite -
Siemens Simatic Winac Rtx F 2010 -
Siemens Simatic Wincc
Siemens Simatic Pcs7 8.2
Siemens Primary Setup Tool -
Siemens Simatic Winac Rtx 2010 -
Siemens Sinema Remote Connect -
Siemens Simatic Wincc \\(tia Portal\\) -
7.2
CVSSv2
CVE-2016-6369
Cisco AnyConnect Secure Mobility Client prior to 4.2.05015 and 4.3.x prior to 4.3.02039 mishandles pathnames, which allows local users to gain privileges via a crafted INF file, aka Bug ID CSCuz92464.
Cisco Anyconnect Secure Mobility Client 2.5.2006
Cisco Anyconnect Secure Mobility Client 2.5.2011
Cisco Anyconnect Secure Mobility Client 3.0.1047
Cisco Anyconnect Secure Mobility Client 2.0.0343
Cisco Anyconnect Secure Mobility Client 2.3.0185
Cisco Anyconnect Secure Mobility Client 2.3.1003
Cisco Anyconnect Secure Mobility Client 2.4.1012
Cisco Anyconnect Secure Mobility Client 3.0.3054
Cisco Anyconnect Secure Mobility Client 3.0.09266
Cisco Anyconnect Secure Mobility Client 3.1.05182
Cisco Anyconnect Secure Mobility Client 4.0\\(64\\)
Cisco Anyconnect Secure Mobility Client 3.1.07021
Cisco Anyconnect Secure Mobility Client 4.0\\(2049\\)
Cisco Anyconnect Secure Mobility Client 4.2.04039
Cisco Anyconnect Secure Mobility Client 4.3.00748
Cisco Anyconnect Secure Mobility Client 2.5.2017
Cisco Anyconnect Secure Mobility Client 2.5.2018
Cisco Anyconnect Secure Mobility Client 2.5.2019
Cisco Anyconnect Secure Mobility Client 2.5.3041
Cisco Anyconnect Secure Mobility Client 2.5.3046
Cisco Anyconnect Secure Mobility Client 2.5.3051
Cisco Anyconnect Secure Mobility Client 2.5.3054
5
CVSSv2
CVE-2016-2180
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL up to and including 1.0.2h allows remote malicious users to cause a denial of service (out-of-bounds read and application crash) via a cr...
Openssl Openssl 1.0.1m
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.1r
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.2g
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.2h
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.1t
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.1p
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1n
Openssl Openssl 1.0.1q
Openssl Openssl 1.0.1e
Openssl Openssl 1.0.1l
6.9
CVSSv2
CVE-2016-0007
The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain...
Microsoft Windows 10 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1511
Microsoft Windows Rt 8.1 -
Microsoft Windows 7 -
Microsoft Windows Vista -
Microsoft Windows Rt -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2008 -
2 EDB exploits
9.3
CVSSv2
CVE-2016-0015
DirectShow in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 allows remote malicious users to execute arbitrary code via a crafted file, aka "DirectShow Hea...
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
Microsoft Windows 8.1 -
Microsoft Windows 7 -
Microsoft Windows 10 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 -
Microsoft Windows 10 1511
Microsoft Windows Vista -
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »