Microsoft

Windows Server 2008

3528 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.8%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate pseudo-handle values in callback para...

  • EPSS 79.75%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SMB Server in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate fields in an SMB request, which allows remote attackers to execute...

  • EPSS 71.09%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SMB Server in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate an internal variable in an SMB packet, which allows remote attackers to cause a denial of service (system hang) via...

  • EPSS 68.31%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack consumption vulnerability in the SMB Server in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to cause a denial of service (system hang) via a malformed SMBv2 compounded request...

  • EPSS 3.44%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Tracing Feature for Services in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 has incorrect ACLs on its registry keys, which allows local users to gain privileges via vectors involving a named pipe and ...

  • EPSS 0.77%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Tracing Feature for Services in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly determine the length of strings in the registry, which allows local users to gain privileges or cause a de...

  • EPSS 0.4%
  • Veröffentlicht 11.08.2010 18:47:49
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate an unspecified system-call argument, ...

Warnung Medienbericht Exploit
  • EPSS 92.59%
  • Veröffentlicht 22.07.2010 05:43:49
  • Zuletzt bearbeitet 22.10.2025 01:15:36

Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not prope...

Exploit
  • EPSS 3.81%
  • Veröffentlicht 02.07.2010 19:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2 and Server 2008 Gold and SP2 allows local users to gain privileges or cause a denial of service (system crash) by using a large number of calls to the NtUs...

  • EPSS 2.1%
  • Veröffentlicht 08.06.2010 22:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 "do not properly validate changes in certain kernel objects," which allows local users to ex...