5.5

CVE-2010-0481

The kernel in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly translate a registry key's virtual path to its real path, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Virtual Path Parsing Vulnerability."

Data is provided by the National Vulnerability Database (NVD)
MicrosoftWindows 7 Version-
MicrosoftWindows Server 2008 Editionitanium
MicrosoftWindows Server 2008 Version- Updatesp2
MicrosoftWindows Server 2008 Version- Updatesp2 Editionitanium
MicrosoftWindows Server 2008 Version- Updatesp2 Editionx64
MicrosoftWindows Server 2008 Version- Updatesp2 Editionx86
MicrosoftWindows Vista Editionx64
MicrosoftWindows Vista Updatesp1
MicrosoftWindows Vista Updatesp2
MicrosoftWindows Vista Version- Updatesp1
MicrosoftWindows Vista Version- Updatesp2
MicrosoftWindows Server 2008 Updater2 Editionitanium
MicrosoftWindows Server 2008 Updater2 Editionx64
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.67% 0.689
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.7 3.4 6.9
AV:L/AC:M/Au:N/C:N/I:N/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.