CVE-2010-3147
- EPSS 25.92%
- Published 27.08.2010 19:00:18
- Last modified 11.04.2025 00:51:21
Untrusted search path vulnerability in wab.exe 6.00.2900.5512 in Windows Address Book in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to ...
CVE-2010-3144
- EPSS 12.28%
- Published 27.08.2010 19:00:02
- Last modified 11.04.2025 00:51:21
Untrusted search path vulnerability in the Internet Connection Signup Wizard in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a Trojan horse smmscrpt.dll file in the current working directory, as demon...
CVE-2010-3138
- EPSS 48.1%
- Published 27.08.2010 19:00:01
- Last modified 11.04.2025 00:51:21
Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player o...
CVE-2010-3140
- EPSS 7.3%
- Published 27.08.2010 19:00:01
- Last modified 11.04.2025 00:51:21
Untrusted search path vulnerability in Microsoft Windows Internet Communication Settings on Windows XP SP3 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse schannel.dll ...
CVE-2010-1886
- EPSS 0.74%
- Published 16.08.2010 18:39:40
- Last modified 11.04.2025 00:51:21
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrate...
CVE-2010-2566
- EPSS 19.16%
- Published 11.08.2010 18:47:51
- Last modified 11.04.2025 00:51:21
The Secure Channel (aka SChannel) security package in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, does not properly validate certificate request messages from TLS and SSL servers, which allows remote servers to execute arbitrary co...
CVE-2010-1894
- EPSS 0.73%
- Published 11.08.2010 18:47:50
- Last modified 11.04.2025 00:51:21
The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, do not properly handle unspecified exceptions, which allows local users to gain privileges via a crafted application, aka "Win32k Exceptio...
CVE-2010-1895
- EPSS 1.49%
- Published 11.08.2010 18:47:50
- Last modified 11.04.2025 00:51:21
The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, do not properly perform memory allocation before copying user-mode data to kernel mode, which allows local users to gain privileges via a ...
CVE-2010-1896
- EPSS 0.99%
- Published 11.08.2010 18:47:50
- Last modified 11.04.2025 00:51:21
The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2 do not properly validate user-mode input passed to kernel mode, which allows l...
CVE-2010-1897
- EPSS 0.8%
- Published 11.08.2010 18:47:50
- Last modified 11.04.2025 00:51:21
The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate pseudo-handle values in callback para...