Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows xp - vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2010-1891
The Client/Server Runtime Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2, when a Chinese, Japanese, or Korean locale is enabled, does not properly allocate memory for transactions, which allows local users to gain privileges v...
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2003
9.3
CVSSv2
CVE-2008-0015
Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, a...
Microsoft Windows 2003 Server -
Microsoft Windows Xp -
Microsoft Windows Xp
2 EDB exploits
9.3
CVSSv2
CVE-2008-0020
Unspecified vulnerability in the Load method in the IPersistStreamInit interface in the Active Template Library (ATL), as used in the Microsoft Video ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, an...
Microsoft Windows 2003 Server -
Microsoft Windows Xp -
Microsoft Windows Xp
8.3
CVSSv2
CVE-2008-1453
The Bluetooth stack in Microsoft Windows XP SP2 and SP3, and Vista Gold and SP1, allows physically proximate malicious users to execute arbitrary code via a large series of Service Discovery Protocol (SDP) packets.
Microsoft Windows Xp
Microsoft Windows-nt Xp
Microsoft Windows Vista
9.3
CVSSv2
CVE-2013-3863
Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allow remote malicious users to execute arbitrary code via a crafted OLE object in a file, aka "OLE Property Vulnerability."
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2003
7.2
CVSSv2
CVE-2013-3899
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate addresses, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability."
Microsoft Windows Server 2003
Microsoft Windows Xp -
Microsoft Windows Xp
6.9
CVSSv2
CVE-2013-3878
Stack-based buffer overflow in the LRPC client in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges by operating an LRPC server that sends a crafted LPC port message, aka "LRPC Client Buffer Overrun Vulnerability."
Microsoft Windows Server 2003
Microsoft Windows Xp -
Microsoft Windows Xp
9.3
CVSSv2
CVE-2010-2563
The Word 97 text converter in the WordPad Text Converters in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly parse malformed structures in Word 97 documents, which allows remote malicious users to execute arbitrary code via a crafted document containing an ...
Microsoft Windows Xp -
Microsoft Windows Server 2003
Microsoft Windows Xp
9.3
CVSSv2
CVE-2010-2567
The RPC client implementation in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly allocate memory during the parsing of responses, which allows remote RPC servers and man-in-the-middle malicious users to execute arbitrary code via a malformed response, aka &...
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2003
9.3
CVSSv2
CVE-2011-3397
The Microsoft Time component in DATIME.DLL in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows remote malicious users to execute arbitrary code via a crafted web site that leverages an unspecified "binary behavior" in Internet Explorer, aka "Microsoft Ti...
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2003
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »