U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:ultimate_n:*:x86:*
  • CPE Name Search: true
There are 2,438 matching records.
Displaying matches 61 through 80.
Vuln ID Summary CVSS Severity
CVE-2021-33752

Windows DNS Snap-in Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33749, CVE-2021-33750, CVE-2021-33756.

Published: July 14, 2021; 2:15:09 PM -0400
V3.1: 8.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-33750

Windows DNS Snap-in Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33749, CVE-2021-33752, CVE-2021-33756.

Published: July 14, 2021; 2:15:09 PM -0400
V3.1: 8.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-33749

Windows DNS Snap-in Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33750, CVE-2021-33752, CVE-2021-33756.

Published: July 14, 2021; 2:15:09 PM -0400
V3.1: 8.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-31979

Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33771, CVE-2021-34514.

Published: July 14, 2021; 2:15:09 PM -0400
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2021-31183

Windows TCP/IP Driver Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33772, CVE-2021-34490.

Published: July 14, 2021; 2:15:09 PM -0400
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2021-34527

Windows Print Spooler Remote Code Execution Vulnerability

Published: July 02, 2021; 6:15:08 PM -0400
V3.1: 8.8 HIGH
V2.0: 9.0 HIGH
CVE-2020-17759

An issue was found in the Evernote client for Windows 10, 7, and 2008 in the protocol handler. This enables attackers for arbitrary command execution if the user clicks on a specially crafted URL. AKA: WINNOTE-19941.

Published: June 24, 2021; 4:15:08 PM -0400
V3.1: 8.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-33742

Windows MSHTML Platform Remote Code Execution Vulnerability

Published: June 08, 2021; 7:15:09 PM -0400
V3.1: 8.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-31973

Windows GPSVC Elevation of Privilege Vulnerability

Published: June 08, 2021; 7:15:09 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-31971

Windows HTML Platform Security Feature Bypass Vulnerability

Published: June 08, 2021; 7:15:09 PM -0400
V3.1: 8.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-31968

Windows Remote Desktop Services Denial of Service Vulnerability

Published: June 08, 2021; 7:15:09 PM -0400
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2021-31962

Kerberos AppContainer Security Feature Bypass Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 9.8 CRITICAL
V2.0: 7.5 HIGH
CVE-2021-31959

Scripting Engine Memory Corruption Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 7.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-31958

Windows NTLM Elevation of Privilege Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 8.8 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-31956

Windows NTFS Elevation of Privilege Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 7.8 HIGH
V2.0: 9.3 HIGH
CVE-2021-31954

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2021-31953

Windows Filter Manager Elevation of Privilege Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-1675

Windows Print Spooler Elevation of Privilege Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 8.8 HIGH
V2.0: 9.3 HIGH
CVE-2020-24588

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

Published: May 11, 2021; 4:15:08 PM -0400
V3.1: 3.5 LOW
V2.0: 2.9 LOW
CVE-2021-31194

OLE Automation Remote Code Execution Vulnerability

Published: May 11, 2021; 3:15:10 PM -0400
V3.1: 8.8 HIGH
V2.0: 6.5 MEDIUM