Page 5 of 15Windows Xp Security Vulnerabilities
| # |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
|
201 |
CVE-2011-1228 |
|
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows
local users to gain privileges via a crafted application that triggers a
NULL pointer dereference, a different vulnerability than other
"Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer
De-reference Vulnerability." |
|
202 |
CVE-2011-1227 |
|
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows
local users to gain privileges via a crafted application that triggers a
NULL pointer dereference, a different vulnerability than other
"Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer
De-reference Vulnerability." |
|
203 |
CVE-2011-1226 |
|
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows
local users to gain privileges via a crafted application that triggers a
NULL pointer dereference, a different vulnerability than other
"Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer
De-reference Vulnerability." |
|
204 |
CVE-2011-1225 |
|
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows
local users to gain privileges via a crafted application that triggers a
NULL pointer dereference, a different vulnerability than other
"Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer
De-reference Vulnerability." |
|
205 |
CVE-2011-0677 |
|
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows
local users to gain privileges via a crafted application that triggers a
NULL pointer dereference, a different vulnerability than other
"Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer
De-reference Vulnerability." |
|
206 |
CVE-2011-0676 |
|
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows
local users to gain privileges via a crafted application that triggers a
NULL pointer dereference, a different vulnerability than other
"Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer
De-reference Vulnerability." |
|
207 |
CVE-2011-0675 |
399 |
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Use-after-free vulnerability in win32k.sys in the kernel-mode
drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2
SP1, and Windows 7 Gold and SP1 allows local users to gain privileges
via a crafted application that leverages incorrect driver object
management, a different vulnerability than other "Vulnerability Type 1"
CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." |
|
208 |
CVE-2011-0674 |
399 |
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Use-after-free vulnerability in win32k.sys in the kernel-mode
drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2
SP1, and Windows 7 Gold and SP1 allows local users to gain privileges
via a crafted application that leverages incorrect driver object
management, a different vulnerability than other "Vulnerability Type 1"
CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." |
|
209 |
CVE-2011-0673 |
|
|
+Priv |
2011-04-13 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP3
allows local users to gain privileges via a crafted application that
triggers a NULL pointer dereference, aka "Win32k Null Pointer
De-reference Vulnerability." |
|
210 |
CVE-2011-0672 |
399 |
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Use-after-free vulnerability in win32k.sys in the kernel-mode
drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2
SP1, and Windows 7 Gold and SP1 allows local users to gain privileges
via a crafted application that leverages incorrect driver object
management, a different vulnerability than other "Vulnerability Type 1"
CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." |
|
211 |
CVE-2011-0671 |
399 |
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Use-after-free vulnerability in win32k.sys in the kernel-mode
drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2
SP1, and Windows 7 Gold and SP1 allows local users to gain privileges
via a crafted application that leverages incorrect driver object
management, a different vulnerability than other "Vulnerability Type 1"
CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." |
|
212 |
CVE-2011-0670 |
399 |
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Use-after-free vulnerability in win32k.sys in the kernel-mode
drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2
SP1, and Windows 7 Gold and SP1 allows local users to gain privileges
via a crafted application that leverages incorrect driver object
management, a different vulnerability than other "Vulnerability Type 1"
CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." |
|
213 |
CVE-2011-0667 |
399 |
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Use-after-free vulnerability in win32k.sys in the kernel-mode
drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2
SP1, and Windows 7 Gold and SP1 allows local users to gain privileges
via a crafted application that leverages incorrect driver object
management, a different vulnerability than other "Vulnerability Type 1"
CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." |
|
214 |
CVE-2011-0666 |
399 |
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Use-after-free vulnerability in win32k.sys in the kernel-mode
drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2
SP1, and Windows 7 Gold and SP1 allows local users to gain privileges
via a crafted application that leverages incorrect driver object
management, a different vulnerability than other "Vulnerability Type 1"
CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." |
|
215 |
CVE-2011-0665 |
399 |
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Use-after-free vulnerability in win32k.sys in the kernel-mode
drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2
SP1, and Windows 7 Gold and SP1 allows local users to gain privileges
via a crafted application that leverages incorrect driver object
management, a different vulnerability than other "Vulnerability Type 1"
CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." |
|
216 |
CVE-2011-0662 |
399 |
|
+Priv |
2011-04-13 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Use-after-free vulnerability in win32k.sys in the kernel-mode
drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2
SP1, and Windows 7 Gold and SP1 allows local users to gain privileges
via a crafted application that leverages incorrect driver object
management, a different vulnerability than other "Vulnerability Type 1"
CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." |
|
217 |
CVE-2011-0661 |
20 |
|
Exec Code |
2011-04-13 |
2018-10-30 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
|
The SMB Server service in Microsoft Windows XP SP2 and SP3,
Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008
Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly
validate fields in SMB requests, which allows remote attackers to
execute arbitrary code via a malformed request in a (1) SMBv1 or (2)
SMBv2 packet, aka "SMB Transaction Parsing Vulnerability." |
|
218 |
CVE-2011-0660 |
20 |
|
Exec Code |
2011-04-13 |
2018-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
The SMB client in Microsoft Windows XP SP2 and SP3, Windows Server
2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2,
and R2 SP1, and Windows 7 Gold and SP1 allows remote SMB servers to
execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response,
aka "SMB Client Response Parsing Vulnerability." |
|
219 |
CVE-2011-0658 |
189 |
|
Exec Code |
2011-06-16 |
2018-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Integer underflow in the OLE Automation protocol implementation in
VBScript.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003
SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and
R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute
arbitrary code via a crafted WMF file, aka "OLE Automation Underflow
Vulnerability." |
|
220 |
CVE-2011-0657 |
20 |
|
Exec Code |
2011-04-13 |
2018-10-30 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
|
DNSAPI.dll in the DNS client in Microsoft Windows XP SP2 and SP3,
Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008
Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly
process DNS queries, which allows remote attackers to execute arbitrary
code via (1) a crafted LLMNR broadcast query or (2) a crafted
application, aka "DNS Query Vulnerability." |
|
221 |
CVE-2011-0096 |
79 |
1
|
XSS |
2011-01-31 |
2018-10-30 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
|
The MHTML protocol handler in Microsoft Windows XP SP2 and SP3,
Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008
Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly
handle a MIME format in a request for content blocks in a document,
which allows remote attackers to conduct cross-site scripting (XSS)
attacks via a crafted web site that is visited in Internet Explorer, aka
"MHTML Mime-Formatted Request Vulnerability." |
|
222 |
CVE-2011-0090 |
20 |
|
+Priv Mem. Corr. |
2011-02-08 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate
user-mode input, which allows local users to gain privileges via a
crafted application, aka "Win32k Memory Corruption Vulnerability." |
|
223 |
CVE-2011-0089 |
20 |
|
+Priv |
2011-02-08 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate
user-mode input, which allows local users to gain privileges via a
crafted application, aka "Win32k Window Class Improper Pointer
Validation Vulnerability." |
|
224 |
CVE-2011-0088 |
20 |
|
+Priv |
2011-02-08 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate
user-mode input, which allows local users to gain privileges via a
crafted application, aka "Win32k Window Class Pointer Confusion
Vulnerability." |
|
225 |
CVE-2011-0087 |
20 |
|
+Priv |
2011-02-08 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and
SP2 does not properly validate user-mode input, which allows local users
to gain privileges via a crafted application, aka "Win32k Insufficient
User Input Validation Vulnerability." |
|
226 |
CVE-2011-0086 |
20 |
|
+Priv |
2011-02-08 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate
user-mode input, which allows local users to gain privileges via a
crafted application, aka "Win32k Improper User Input Validation
Vulnerability." |
|
227 |
CVE-2011-0045 |
119 |
|
Overflow +Priv |
2011-02-08 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
The Trace Events functionality in the kernel in Microsoft Windows
XP SP3 does not properly perform type conversion, which causes integer
truncation and insufficient memory allocation and triggers a buffer
overflow, which allows local users to gain privileges via a crafted
application, related to WmiTraceMessageVa, aka "Windows Kernel Integer
Truncation Vulnerability." |
|
228 |
CVE-2011-0043 |
310 |
|
+Priv |
2011-02-10 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Kerberos in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2
supports weak hashing algorithms, which allows local users to gain
privileges by operating a service that sends crafted service tickets, as
demonstrated by the CRC32 algorithm, aka "Kerberos Unkeyed Checksum
Vulnerability." |
|
229 |
CVE-2011-0042 |
20 |
|
Exec Code |
2011-03-09 |
2018-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
SBE.dll in the Stream Buffer Engine in Windows Media Player and
Windows Media Center in Microsoft Windows XP SP2 and SP3, Windows XP
Media Center Edition 2005 SP3, Windows Vista SP1 and SP2, Windows 7 Gold
and SP1, and Windows Media Center TV Pack for Windows Vista does not
properly parse Digital Video Recording (.dvr-ms) files, which allows
remote attackers to execute arbitrary code via a crafted file, aka
"DVR-MS Vulnerability." |
|
230 |
CVE-2011-0041 |
189 |
|
Exec Code Overflow |
2011-04-13 |
2018-10-12 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Integer overflow in gdiplus.dll in GDI+ in Microsoft Windows XP
SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold and SP2, and Office XP SP3 allows remote attackers to
execute arbitrary code via a crafted EMF image, aka "GDI+ Integer
Overflow Vulnerability." |
|
231 |
CVE-2011-0039 |
287 |
|
+Priv |
2011-02-08 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
The Local Security Authority Subsystem Service (LSASS) in
Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly
process authentication requests, which allows local users to gain
privileges via a request with a crafted length, aka "LSASS Length
Validation Vulnerability." |
|
232 |
CVE-2011-0034 |
119 |
|
Exec Code Overflow |
2011-04-13 |
2018-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Stack-based buffer overflow in the OpenType Compact Font Format
(aka OTF or CFF) driver in Microsoft Windows XP SP2 and SP3, Windows
Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold,
SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers
to execute arbitrary code via crafted parameter values in an OpenType
font, aka "OpenType Font Stack Overflow Vulnerability." |
|
233 |
CVE-2011-0033 |
20 |
|
Exec Code |
2011-02-10 |
2018-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
The OpenType Compact Font Format (CFF) driver in Microsoft Windows
XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2,
Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly
validate parameter values in OpenType fonts, which allows remote
attackers to execute arbitrary code via a crafted font, aka "OpenType
Font Encoded Character Vulnerability." |
|
234 |
CVE-2011-0030 |
264 |
|
+Priv +Info |
2011-02-08 |
2018-10-12 |
4.7 |
None |
Local |
Medium |
Not required |
Complete |
None |
None |
|
The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows
XP SP2 and SP3 and Server 2003 SP2 does not properly kill processes
after a logout, which allows local users to obtain sensitive information
or gain privileges via a crafted application that continues to execute
throughout the logout of one user and the login session of the next
user, aka "CSRSS Elevation of Privilege Vulnerability," a different
vulnerability than CVE-2010-0023. |
|
235 |
CVE-2011-0029 |
|
|
+Priv |
2011-03-09 |
2018-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Untrusted search path vulnerability in the client in Microsoft
Remote Desktop Connection 5.2, 6.0, 6.1, and 7.0 allows local users to
gain privileges via a Trojan horse DLL in the current working directory,
as demonstrated by a directory that contains a .rdp file, aka "Remote
Desktop Insecure Library Loading Vulnerability." |
|
236 |
CVE-2011-0028 |
94 |
|
Exec Code |
2011-04-13 |
2018-10-12 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
WordPad in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2
does not properly parse fields in Word documents, which allows remote
attackers to execute arbitrary code via a crafted .doc file, aka
"WordPad Converter Parsing Vulnerability." |
|
237 |
CVE-2010-4701 |
119 |
1
|
Exec Code Overflow |
2011-01-20 |
2017-09-18 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
|
Heap-based buffer overflow in the CDrawPoly::Serialize function in
fxscover.exe in Microsoft Windows Fax Services Cover Page Editor 5.2 r2
in Windows XP Professional SP3, Server 2003 R2 Enterprise Edition SP2,
and Windows 7 Professional allows remote attackers to execute arbitrary
code via a long record in a Fax Cover Page (.cov) file. NOTE: some of
these details are obtained from third party information. |
|
238 |
CVE-2010-4669 |
399 |
|
DoS |
2011-01-07 |
2017-08-16 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
|
The Neighbor Discovery (ND) protocol implementation in the IPv6
stack in Microsoft Windows XP, Windows Server 2003, Windows Vista,
Windows Server 2008, and Windows 7 allows remote attackers to cause a
denial of service (CPU consumption and system hang) by sending many
Router Advertisement (RA) messages with different source addresses, as
demonstrated by the flood_router6 program in the thc-ipv6 package. |
|
239 |
CVE-2010-4562 |
200 |
|
+Info |
2012-02-02 |
2012-02-03 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
|
Microsoft Windows 2008, 7, Vista, 2003, 2000, and XP, when using
IPv6, allows remote attackers to determine whether a host is sniffing
the network by sending an ICMPv6 Echo Request to a multicast address and
determining whether an Echo Reply is sent, as demonstrated by thcping.
NOTE: due to a typo, some sources map CVE-2010-4562 to a ProFTPd mod_sql
vulnerability, but that issue is covered by CVE-2010-4652. |
|
240 |
CVE-2010-4398 |
119 |
1
|
Overflow +Priv Bypass |
2010-12-06 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Stack-based buffer overflow in the RtlQueryRegistryValues function
in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003
SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2,
and Windows 7 allows local users to gain privileges, and bypass the User
Account Control (UAC) feature, via a crafted REG_BINARY value for a
SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction
with Windows Kernel Vulnerability." |
|
241 |
CVE-2010-4182 |
|
|
Exec Code |
2010-11-04 |
2010-11-05 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Untrusted search path vulnerability in the Data Access Objects
(DAO) library (dao360.dll) in Microsoft Windows XP Professional SP3,
Windows Server 2003 R2 Enterprise Edition SP3, Windows Vista Business
SP1, and Windows 7 Professional allows local users, and possibly remote
attackers, to execute arbitrary code and conduct DLL hijacking attacks
via a Trojan horse msjet49.dll that is located in the same folder as a
file that is processed by dao360.dll. NOTE: the provenance of this
information is unknown; the details are obtained solely from third party
information. |
|
242 |
CVE-2010-3974 |
119 |
|
Exec Code Overflow Mem. Corr. |
2011-04-13 |
2018-10-30 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
|
fxscover.exe in the Fax Cover Page Editor in Microsoft Windows XP
SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does
not properly parse FAX cover pages, which allows remote attackers to
execute arbitrary code via a crafted .cov file, aka "Fax Cover Page
Editor Memory Corruption Vulnerability." |
|
243 |
CVE-2010-3970 |
119 |
1
|
Exec Code Overflow |
2010-12-22 |
2018-10-12 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Stack-based buffer overflow in the CreateSizedDIBSECTION function
in shimgvw.dll in the Windows Shell graphics processor (aka graphics
rendering engine) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2,
Vista SP1 and SP2, and Server 2008 Gold and SP2 allows remote attackers
to execute arbitrary code via a crafted .MIC or unspecified Office
document containing a thumbnail bitmap with a negative biClrUsed value,
as reported by Moti and Xu Hao, aka "Windows Shell Graphics Processing
Overrun Vulnerability." |
|
244 |
CVE-2010-3963 |
119 |
|
Overflow +Priv |
2010-12-16 |
2018-10-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Buffer overflow in the Routing and Remote Access NDProxy component
in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2
allows local users to gain privileges via a crafted application, related
to the Routing and Remote Access service (RRAS) and improper copying
from user mode to the kernel, aka "Kernel NDProxy Buffer Overflow
Vulnerability." |
|
245 |
CVE-2010-3959 |
94 |
|
+Priv |
2010-12-16 |
2018-10-30 |
6.9 |
None |
Local |
Medium |
Not required |
Complete |
Complete |
Complete |
|
The OpenType Font (OTF) driver in Microsoft Windows XP SP2 and
SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server
2008 Gold, SP2, and R2, and Windows 7 allows local users to gain
privileges via a crafted CMAP table in an OpenType font, aka "OpenType
CMAP Table Vulnerability." |
|
246 |
CVE-2010-3957 |
399 |
|
+Priv |
2010-12-16 |
2018-10-30 |
6.9 |
None |
Local |
Medium |
Not required |
Complete |
Complete |
Complete |
|
Double free vulnerability in the OpenType Font (OTF) driver in
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista
SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7
allows local users to gain privileges via a crafted OpenType font, aka
"OpenType Font Double Free Vulnerability." |
|
247 |
CVE-2010-3956 |
94 |
|
+Priv |
2010-12-16 |
2018-10-30 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
|
The OpenType Font (OTF) driver in Microsoft Windows XP SP2 and
SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server
2008 Gold, SP2, and R2, and Windows 7 does not properly perform array
indexing, which allows local users to gain privileges via a crafted
OpenType font, aka "OpenType Font Index Vulnerability." |
|
248 |
CVE-2010-3943 |
264 |
|
+Priv |
2010-12-16 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, and R2, and Windows 7 does not properly link
driver objects, which allows local users to gain privileges via a
crafted application that triggers linked-list corruption, aka "Win32k
Cursor Linking Vulnerability." |
|
249 |
CVE-2010-3942 |
119 |
|
Overflow +Priv |
2010-12-16 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2
and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows
Server 2008 Gold, SP2, and R2, and Windows 7 does not properly allocate
memory for copies from user mode, which allows local users to gain
privileges via a crafted application, aka "Win32k WriteAV
Vulnerability." |
|
250 |
CVE-2010-3941 |
399 |
|
+Priv |
2010-12-16 |
2018-10-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
|
Double free vulnerability in win32k.sys in the kernel-mode drivers
in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows
Vista SP1 and SP2, Windows Server 2008 Gold and SP2, and Windows 7
allows local users to gain privileges via a crafted application, aka
"Win32k Double Free Vulnerability." |
|
|