Microsoft

Windows 7

2368 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 25.84%
  • Veröffentlicht 15.09.2010 19:00:18
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in the Local Security Authority Subsystem Service (LSASS), as used in Active Directory in Microsoft Windows Server 2003 SP2 and Windows Server 2008 Gold, SP2, and R2; Active Directory Application Mode (ADAM) in Windows XP S...

Exploit
  • EPSS 0.91%
  • Veröffentlicht 07.09.2010 18:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Buffer overflow in the CreateDIBPalette function in win32k.sys in Microsoft Windows XP SP3, Server 2003 R2 Enterprise SP2, Vista Business SP1, Windows 7, and Server 2008 SP2 allows local users to cause a denial of service (crash) and possibly execute...

Exploit
  • EPSS 25.92%
  • Veröffentlicht 27.08.2010 19:00:18
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Untrusted search path vulnerability in wab.exe 6.00.2900.5512 in Windows Address Book in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to ...

  • EPSS 0.74%
  • Veröffentlicht 16.08.2010 18:39:40
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrate...

  • EPSS 0.48%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The kernel in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate ACLs on kernel objects, which allows local users to cause a denial of service (reboot) via a crafted application, aka "...

  • EPSS 80.21%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The TCP/IP stack in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly handle malformed IPv6 packets, which allows remote attackers to cause a denial of service (system hang) via multiple craft...

  • EPSS 0.64%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the TCP/IP stack in Microsoft Windows Vista SP1, Windows Server 2008 Gold and R2, and Windows 7 allows local users to gain privileges via a buffer of user-mode data that is copied to kernel mode, aka "Integer Overflow in Windows N...

  • EPSS 0.8%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate pseudo-handle values in callback para...

  • EPSS 79.75%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SMB Server in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate fields in an SMB request, which allows remote attackers to execute...

  • EPSS 66.19%
  • Veröffentlicht 11.08.2010 18:47:50
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The SMB Server in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate an internal variable in an SMB packet, which allows remote attackers to cause a denial of service (system hang) via...