Microsoft

Windows Xp

739 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 64.4%
  • Veröffentlicht 15.08.2012 01:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in the Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP2 and SP3 allows remote attackers to execute arbitrary code via crafted RAP response packets, aka "Remote...

  • EPSS 64.4%
  • Veröffentlicht 15.08.2012 01:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in the Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP3 allows remote attackers to execute arbitrary code via crafted RAP response packets, aka "Remote Admini...

  • EPSS 60.8%
  • Veröffentlicht 15.08.2012 01:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP3 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to a deleted object, ak...

  • EPSS 0.92%
  • Veröffentlicht 15.08.2012 01:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain priv...

  • EPSS 9.6%
  • Veröffentlicht 10.07.2012 21:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaint...

  • EPSS 0.36%
  • Veröffentlicht 10.07.2012 21:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle keyboard-layout files, which allows lo...

  • EPSS 0.36%
  • Veröffentlicht 10.07.2012 21:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate callback parameters during creation ...

  • EPSS 45.01%
  • Veröffentlicht 10.07.2012 21:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted name for a (1) file or (2) ...

  • EPSS 52.28%
  • Veröffentlicht 12.06.2012 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which a...

  • EPSS 86.54%
  • Veröffentlicht 12.06.2012 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-R...