Page 2 of 15Windows Xp Security Vulnerabilities
| # |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
|
51 |
CVE-2013-1334 |
119 |
|
Overflow +Priv |
2013-05-14 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008
SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and
Windows RT does not properly handle objects in memory, which allows
local users to gain privileges via a crafted application, aka "Win32k
Window Handle Vulnerability." |
|
52 |
CVE-2013-1313 |
399 |
|
Exec Code |
2013-02-13 |
2018-10-12 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Object Linking and Embedding (OLE) Automation in Microsoft Windows
XP SP3 does not properly allocate memory, which allows remote attackers
to execute arbitrary code via a crafted RTF document, aka "OLE
Automation Remote Code Execution Vulnerability." |
|
53 |
CVE-2013-1300 |
264 |
1
|
+Priv |
2013-07-09 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008
SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and
Windows RT does not properly handle objects in memory, which allows
local users to gain privileges via a crafted application, aka "Win32k
Memory Allocation Vulnerability." |
|
54 |
CVE-2013-1295 |
119 |
|
Overflow +Priv Mem. Corr. |
2013-04-09 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows
XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 does not
properly handle objects in memory, which allows local users to gain
privileges via a crafted application, aka "CSRSS Memory Corruption
Vulnerability." |
|
55 |
CVE-2013-1294 |
362 |
|
+Priv |
2013-04-09 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in the kernel in Microsoft Windows XP SP2 and SP3,
Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2,
and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and
Windows RT allows local users to gain privileges via a crafted
application that leverages improper handling of objects in memory, aka
"Kernel Race Condition Vulnerability." |
|
56 |
CVE-2013-1291 |
20 |
|
DoS |
2013-04-09 |
2018-10-12 |
7.1 |
None |
Remote |
Medium |
Not required |
None |
None |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3,
Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2,
Windows 7 Gold and SP1, and Windows 8 allows local users to cause a
denial of service (reboot) via a crafted OpenType font, aka "OpenType
Font Parsing Vulnerability" or "Win32k Font Parsing Vulnerability." |
|
57 |
CVE-2013-1287 |
264 |
|
Exec Code |
2013-03-12 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3,
Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2,
and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012
do not properly handle objects in memory, which allows physically
proximate attackers to execute arbitrary code by connecting a crafted
USB device, aka "Windows USB Descriptor Vulnerability," a different
vulnerability than CVE-2013-1285 and CVE-2013-1286. |
|
58 |
CVE-2013-1286 |
264 |
|
Exec Code |
2013-03-12 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3,
Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2,
and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012
do not properly handle objects in memory, which allows physically
proximate attackers to execute arbitrary code by connecting a crafted
USB device, aka "Windows USB Descriptor Vulnerability," a different
vulnerability than CVE-2013-1285 and CVE-2013-1287. |
|
59 |
CVE-2013-1285 |
264 |
|
Exec Code |
2013-03-12 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3,
Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2,
and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012
do not properly handle objects in memory, which allows physically
proximate attackers to execute arbitrary code by connecting a crafted
USB device, aka "Windows USB Descriptor Vulnerability," a different
vulnerability than CVE-2013-1286 and CVE-2013-1287. |
|
60 |
CVE-2013-1283 |
362 |
|
+Priv |
2013-04-09 |
2018-10-12 |
6.9 |
None |
Local |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1,
Windows 8, Windows Server 2012, and Windows RT allows local users to
gain privileges via a crafted application that leverages improper
handling of objects in memory, aka "Win32k Race Condition
Vulnerability." |
|
61 |
CVE-2013-1280 |
264 |
|
+Priv |
2013-02-13 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
The kernel in Microsoft Windows XP SP2 and SP3, Windows Server
2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1,
Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT
does not properly handle objects in memory, which allows local users to
gain privileges via a crafted application, aka "Windows Kernel Reference
Count Vulnerability." |
|
62 |
CVE-2013-1279 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Race condition in the kernel in Microsoft Windows XP SP2 and SP3,
Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2,
and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and
Windows RT allows local users to gain privileges via a crafted
application that leverages incorrect handling of objects in memory, aka
"Kernel Race Condition Vulnerability," a different vulnerability than
CVE-2013-1278. |
|
63 |
CVE-2013-1278 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Race condition in the kernel in Microsoft Windows XP SP2 and SP3,
Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2,
and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and
Windows RT allows local users to gain privileges via a crafted
application that leverages incorrect handling of objects in memory, aka
"Kernel Race Condition Vulnerability," a different vulnerability than
CVE-2013-1279. |
|
64 |
CVE-2013-1277 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
65 |
CVE-2013-1276 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
66 |
CVE-2013-1275 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
67 |
CVE-2013-1274 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
68 |
CVE-2013-1273 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
69 |
CVE-2013-1272 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
70 |
CVE-2013-1271 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
71 |
CVE-2013-1270 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
72 |
CVE-2013-1269 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
73 |
CVE-2013-1268 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
74 |
CVE-2013-1267 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
75 |
CVE-2013-1266 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
76 |
CVE-2013-1265 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
77 |
CVE-2013-1264 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
78 |
CVE-2013-1263 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
79 |
CVE-2013-1262 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
80 |
CVE-2013-1261 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
81 |
CVE-2013-1260 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
82 |
CVE-2013-1259 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
83 |
CVE-2013-1258 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
84 |
CVE-2013-1257 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
85 |
CVE-2013-1256 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
86 |
CVE-2013-1255 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
87 |
CVE-2013-1254 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
88 |
CVE-2013-1253 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
89 |
CVE-2013-1252 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
90 |
CVE-2013-1251 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
91 |
CVE-2013-1250 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and
SP1 allows local users to gain privileges, and consequently read the
contents of arbitrary kernel memory locations, via a crafted
application, a different vulnerability than other CVEs listed in
MS13-016. |
|
92 |
CVE-2013-1249 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1,
Windows 8, Windows Server 2012, and Windows RT allows local users to
gain privileges, and consequently read the contents of arbitrary kernel
memory locations, via a crafted application, a different vulnerability
than other CVEs listed in MS13-016. |
|
93 |
CVE-2013-1248 |
362 |
|
+Priv |
2013-02-13 |
2018-10-12 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
|
Race condition in win32k.sys in the kernel-mode drivers in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1,
Windows 8, Windows Server 2012, and Windows RT allows local users to
gain privileges, and consequently read the contents of arbitrary kernel
memory locations, via a crafted application, a different vulnerability
than other CVEs listed in MS13-016. |
|
94 |
CVE-2013-0992 |
399 |
|
DoS Exec Code Mem. Corr. |
2013-05-20 |
2018-10-30 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
|
WebKit, as used in Apple iTunes before 11.0.3, allows
man-in-the-middle attackers to execute arbitrary code or cause a denial
of service (memory corruption and application crash) via vectors related
to iTunes Store browsing, a different vulnerability than other WebKit
CVEs listed in APPLE-SA-2013-05-16-1. |
|
95 |
CVE-2013-0810 |
94 |
|
Exec Code |
2013-09-11 |
2018-10-12 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows
Vista SP2, and Windows Server 2008 SP2 allow remote attackers to
execute arbitrary code via a crafted screensaver in a theme file, aka
"Windows Theme File Remote Code Execution Vulnerability." |
|
96 |
CVE-2013-0077 |
94 |
|
Exec Code |
2013-02-13 |
2018-10-12 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Quartz.dll in DirectShow in Microsoft Windows XP SP2 and SP3,
Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows remote attackers
to execute arbitrary code via crafted media content in (1) a media file,
(2) a media stream, or (3) a Microsoft Office document, aka "Media
Decompression Vulnerability." |
|
97 |
CVE-2013-0007 |
94 |
|
Exec Code |
2013-01-09 |
2018-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Microsoft XML Core Services (aka MSXML) 4.0, 5.0, and 6.0 does not
properly parse XML content, which allows remote attackers to execute
arbitrary code via a crafted web page, aka "MSXML XSLT Vulnerability."
|
|
98 |
CVE-2013-0006 |
189 |
|
Exec Code |
2013-01-09 |
2018-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Microsoft XML Core Services (aka MSXML) 3.0, 5.0, and 6.0 does not
properly parse XML content, which allows remote attackers to execute
arbitrary code via a crafted web page, aka "MSXML Integer Truncation
Vulnerability." |
|
99 |
CVE-2012-4786 |
94 |
|
Exec Code |
2012-12-11 |
2018-10-12 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
|
The kernel-mode drivers in Microsoft Windows XP SP2 and SP3,
Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2,
and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and
Windows RT allow remote attackers to execute arbitrary code via a
crafted TrueType Font (TTF) file, aka "TrueType Font Parsing
Vulnerability." |
|
100 |
CVE-2012-4774 |
94 |
|
Exec Code |
2012-12-11 |
2018-10-12 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows
Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold
and SP1 allow remote attackers to execute arbitrary code via a crafted
(1) file name or (2) subfolder name that triggers use of unallocated
memory as the destination of a copy operation, aka "Windows Filename
Parsing Vulnerability." |
|
|