### [CVE-2017-8682](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8682) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20graphics&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Microsoft%20Windows%20Server%202008%20SP2%20and%20R2%20SP1%2C%20Windows%207%20SP1%2C%20Windows%208.1%2C%20Windows%20Server%202012%20Gold%20and%20R2%2C%20Windows%20RT%208.1%2C%20Windows%2010%20Gold%2C%201511%2C%201607%2C%20and%201703%2C%20Windows%20Server%202016%2C%20Microsoft%20Office%20Word%20Viewer%2C%20Microsoft%20Office%202007%20Service%20Pack%203%20%2C%20and%20Microsoft%20Office%202010%20Service%20Pack%202%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen) ### Description Windows graphics on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, Windows Server 2016, Microsoft Office Word Viewer, Microsoft Office 2007 Service Pack 3 , and Microsoft Office 2010 Service Pack 2 allows an attacker to execute remote code by the way it handles embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8683. ### POC #### Reference - https://www.exploit-db.com/exploits/42744/ #### Github No PoCs found on GitHub currently.