Microsoft

Windows Vista

828 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.2%
  • Veröffentlicht 08.06.2010 22:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 Gold and SP2, Windows 7, and Server 2008 R2 allows local users to execute arbitrary code via vectors related ...

  • EPSS 1.39%
  • Veröffentlicht 08.06.2010 20:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Unspecified vulnerability in the Windows OpenType Compact Font Format (CFF) driver in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users to execute arbitrary code v...

  • EPSS 0.61%
  • Veröffentlicht 14.04.2010 16:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly validate a registry-key argument to an unspecified system call, which allows local users to cause a de...

  • EPSS 0.74%
  • Veröffentlicht 14.04.2010 16:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not perform the expected validation before creating a symbolic link, which allows local users to cause a denial of service (reboot) via a crafted applicati...

  • EPSS 1.76%
  • Veröffentlicht 14.04.2010 16:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not properly allocate memory for the destination key associated with a symbolic-link registry key, which allows local users to gain privileges via a crafte...

  • EPSS 1.01%
  • Veröffentlicht 14.04.2010 16:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Unspecified vulnerability in registry-key validation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel ...

  • EPSS 59.22%
  • Veröffentlicht 14.04.2010 16:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SMB client in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly allocate memory for SMB responses, which allows re...

  • EPSS 46.56%
  • Veröffentlicht 14.04.2010 16:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SMB client in Microsoft Windows Server 2003 SP2, Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2 allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption an...

  • EPSS 83.49%
  • Veröffentlicht 14.04.2010 16:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a craft...

  • EPSS 0.67%
  • Veröffentlicht 14.04.2010 16:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The kernel in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly translate a registry key's virtual path to its real path, which allows local users to cause a denial of service (reboot) ...