7.2
CVSSv2

CVE-2017-0001

Published: 17/03/2017 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0005, CVE-2017-0025, and CVE-2017-0047.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2012 r2

microsoft windows 8.1

microsoft windows rt 8.1

microsoft windows server 2012 -

microsoft windows 10 -

microsoft windows 7

microsoft windows server 2008

microsoft windows 10 1511

microsoft windows 10 1607

microsoft windows server 2008 r2

microsoft windows vista

Github Repositories

A Node.JS microservice to import CVE and CPE Data Feeds into a MongoDB

VEACH Remote DB VEACH – Vulnerabilities Exposure and Analysis in Code and Hardware A remote managed CVE and CPE MongoDB that syncs with NIST NVD Data feeds Explore the docs » View Demo · Report Bug · Request Feature Table of Contents About The Project Built With

JSON API for NVD CVE details data feeds from NIST

NVD CVE Details as JSON-REST API NVD vulnerability data feeds are published as year-wise JSON files in gzip format This makes fetching CVE details for particular CVE ID very difficult This project mirrors CVE Details into MongoDB and then provide queryable REST-API using NodeJS This will also set background cron-job to keep local database up-to-date with NIST data feeds as s

A script to import CVE feeds by NVD in MISP platform.

MISP Import CVE The script allows to import all CVE list in MISP platform with its relative content like descriptions and references MISP events are very useful thanks to the tags created for each platform subject to the described vulnerability Prerequisites Before install the script, you make sure to have permission into virtual machine server that hosts the MISP application