U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:o:microsoft:windows_7:-:sp1:x32:*:*:*:*:*
  • CPE Name Search: true
There are 2,609 matching records.
Displaying matches 261 through 280.
Vuln ID Summary CVSS Severity
CVE-2021-31971

Windows HTML Platforms Security Feature Bypass Vulnerability

Published: June 08, 2021; 7:15:09 PM -0400
V3.1: 6.8 MEDIUM
V2.0: 6.8 MEDIUM
CVE-2021-31968

Windows Remote Desktop Services Denial of Service Vulnerability

Published: June 08, 2021; 7:15:09 PM -0400
V3.1: 7.5 HIGH
V2.0: 5.0 MEDIUM
CVE-2021-31962

Kerberos AppContainer Security Feature Bypass Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 9.4 CRITICAL
V2.0: 7.5 HIGH
CVE-2021-31959

Scripting Engine Memory Corruption Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 6.4 MEDIUM
V2.0: 6.8 MEDIUM
CVE-2021-31958

Windows NTLM Elevation of Privilege Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 7.5 HIGH
V2.0: 6.8 MEDIUM
CVE-2021-31956

Windows NTFS Elevation of Privilege Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 7.8 HIGH
V2.0: 9.3 HIGH
CVE-2021-31954

Windows Common Log File System Driver Elevation of Privilege Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 7.8 HIGH
V2.0: 7.2 HIGH
CVE-2021-31953

Windows Filter Manager Elevation of Privilege Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-1675

Windows Print Spooler Remote Code Execution Vulnerability

Published: June 08, 2021; 7:15:08 PM -0400
V3.1: 7.8 HIGH
V2.0: 9.3 HIGH
CVE-2020-24588

The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.

Published: May 11, 2021; 4:15:08 PM -0400
V3.1: 3.5 LOW
V2.0: 2.9 LOW
CVE-2021-31194

OLE Automation Remote Code Execution Vulnerability

Published: May 11, 2021; 3:15:10 PM -0400
V3.1: 8.8 HIGH
V2.0: 6.5 MEDIUM
CVE-2021-31193

Windows SSDP Service Elevation of Privilege Vulnerability

Published: May 11, 2021; 3:15:10 PM -0400
V3.1: 7.8 HIGH
V2.0: 4.6 MEDIUM
CVE-2021-31188

Windows Graphics Component Elevation of Privilege Vulnerability

Published: May 11, 2021; 3:15:10 PM -0400
V3.1: 7.8 HIGH
V2.0: 2.1 LOW
CVE-2021-31186

Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability

Published: May 11, 2021; 3:15:09 PM -0400
V3.1: 7.4 HIGH
V2.0: 4.3 MEDIUM
CVE-2021-31184

Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability

Published: May 11, 2021; 3:15:09 PM -0400
V3.1: 5.5 MEDIUM
V2.0: 2.1 LOW
CVE-2021-31182

Microsoft Bluetooth Driver Spoofing Vulnerability

Published: May 11, 2021; 3:15:09 PM -0400
V3.1: 7.1 HIGH
V2.0: 4.8 MEDIUM
CVE-2021-28455

Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability

Published: May 11, 2021; 3:15:08 PM -0400
V3.1: 8.8 HIGH
V2.0: 6.5 MEDIUM
CVE-2021-26419

Scripting Engine Memory Corruption Vulnerability

Published: May 11, 2021; 3:15:08 PM -0400
V3.1: 7.5 HIGH
V2.0: 7.6 HIGH
CVE-2021-28447

Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability

Published: April 13, 2021; 4:15:19 PM -0400
V3.1: 4.4 MEDIUM
V2.0: 2.1 LOW
CVE-2021-28446

Windows Portmapping Information Disclosure Vulnerability

Published: April 13, 2021; 4:15:19 PM -0400
V3.1: 7.1 HIGH
V2.0: 2.1 LOW