7.8
CVSSv3

CVE-2017-0025

Published: 17/03/2017 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The kernel-mode drivers in Microsoft Windows Vista; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0005, and CVE-2017-0047.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 1607

microsoft windows rt 8.1

microsoft windows server 2016

microsoft windows 7

microsoft windows server 2008

microsoft windows 10 -

microsoft windows 10 1511

microsoft windows server 2008 r2

microsoft windows vista

microsoft windows server 2012 -

microsoft windows server 2012 r2

microsoft windows 8.1

Github Repositories

A Node.JS microservice to import CVE and CPE Data Feeds into a MongoDB

VEACH Remote DB VEACH – Vulnerabilities Exposure and Analysis in Code and Hardware A remote managed CVE and CPE MongoDB that syncs with NIST NVD Data feeds Explore the docs » View Demo · Report Bug · Request Feature Table of Contents About The Project Built With

JSON API for NVD CVE details data feeds from NIST

NVD CVE Details as JSON-REST API NVD vulnerability data feeds are published as year-wise JSON files in gzip format This makes fetching CVE details for particular CVE ID very difficult This project mirrors CVE Details into MongoDB and then provide queryable REST-API using NodeJS This will also set background cron-job to keep local database up-to-date with NIST data feeds as s