7
CVSSv3

CVE-2017-0005

Published: 17/03/2017 Updated: 03/10/2019
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 615
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0025, and CVE-2017-0047.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2012 -

microsoft windows server 2012 r2

microsoft windows 10 -

microsoft windows 10 1511

microsoft windows server 2008

microsoft windows server 2008 r2

microsoft windows 10 1607

microsoft windows rt 8.1

microsoft windows vista

microsoft windows 8.1

microsoft windows 7

Github Repositories

A Node.JS microservice to import CVE and CPE Data Feeds into a MongoDB

VEACH Remote DB VEACH – Vulnerabilities Exposure and Analysis in Code and Hardware A remote managed CVE and CPE MongoDB that syncs with NIST NVD Data feeds Explore the docs » View Demo · Report Bug · Request Feature Table of Contents About The Project Built With

JSON API for NVD CVE details data feeds from NIST

NVD CVE Details as JSON-REST API NVD vulnerability data feeds are published as year-wise JSON files in gzip format This makes fetching CVE details for particular CVE ID very difficult This project mirrors CVE Details into MongoDB and then provide queryable REST-API using NodeJS This will also set background cron-job to keep local database up-to-date with NIST data feeds as s