Microsoft

Windows Vista

828 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.2%
  • Published 08.06.2010 22:30:01
  • Last modified 11.04.2025 00:51:21

The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 Gold and SP2, Windows 7, and Server 2008 R2 allows local users to execute arbitrary code via vectors related ...

  • EPSS 1.39%
  • Published 08.06.2010 20:30:01
  • Last modified 11.04.2025 00:51:21

Unspecified vulnerability in the Windows OpenType Compact Font Format (CFF) driver in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users to execute arbitrary code v...

  • EPSS 0.61%
  • Published 14.04.2010 16:00:01
  • Last modified 11.04.2025 00:51:21

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly validate a registry-key argument to an unspecified system call, which allows local users to cause a de...

  • EPSS 0.74%
  • Published 14.04.2010 16:00:01
  • Last modified 11.04.2025 00:51:21

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not perform the expected validation before creating a symbolic link, which allows local users to cause a denial of service (reboot) via a crafted applicati...

  • EPSS 1.76%
  • Published 14.04.2010 16:00:01
  • Last modified 11.04.2025 00:51:21

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not properly allocate memory for the destination key associated with a symbolic-link registry key, which allows local users to gain privileges via a crafte...

  • EPSS 1.01%
  • Published 14.04.2010 16:00:01
  • Last modified 11.04.2025 00:51:21

Unspecified vulnerability in registry-key validation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel ...

  • EPSS 59.22%
  • Published 14.04.2010 16:00:01
  • Last modified 11.04.2025 00:51:21

The SMB client in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly allocate memory for SMB responses, which allows re...

  • EPSS 46.56%
  • Published 14.04.2010 16:00:01
  • Last modified 11.04.2025 00:51:21

The SMB client in Microsoft Windows Server 2003 SP2, Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2 allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption an...

  • EPSS 83.49%
  • Published 14.04.2010 16:00:01
  • Last modified 11.04.2025 00:51:21

Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a craft...

  • EPSS 0.67%
  • Published 14.04.2010 16:00:01
  • Last modified 11.04.2025 00:51:21

The kernel in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly translate a registry key's virtual path to its real path, which allows local users to cause a denial of service (reboot) ...