Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows-nt vista vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2008-2246
Microsoft Windows Vista through SP1 and Server 2008 do not properly import the default IPsec policy from a Windows Server 2003 domain to a Windows Server 2008 domain, which prevents IPsec rules from being enforced and allows remote malicious users to bypass intended access restri...
Microsoft Windows Vista
Microsoft Windows Vista -
Microsoft Windows-nt 2008
9.3
CVSSv2
CVE-2008-1435
Windows Explorer in Microsoft Windows Vista up to SP1, and Server 2008, allows user-assisted remote malicious users to execute arbitrary code via crafted saved-search (.search-ms) files that are not properly handled when saving, aka "Windows Saved Search Vulnerability."
Microsoft Windows Vista
Microsoft Windows-nt 2008
8.3
CVSSv2
CVE-2008-1453
The Bluetooth stack in Microsoft Windows XP SP2 and SP3, and Vista Gold and SP1, allows physically proximate malicious users to execute arbitrary code via a large series of Service Discovery Protocol (SDP) packets.
Microsoft Windows Xp
Microsoft Windows-nt Xp
Microsoft Windows Vista
9
CVSSv2
CVE-2008-1436
Microsoft Windows XP Professional SP2, Vista, and Server 2003 and 2008 does not properly assign activities to the (1) NetworkService and (2) LocalService accounts, which might allow context-dependent malicious users to gain privileges by using one service process to capture a res...
Microsoft Windows Xp
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Vista -
Microsoft Windows-nt Vista
Microsoft Windows Vista
1 EDB exploit
9.3
CVSSv2
CVE-2008-1086
The HxTocCtrl ActiveX control (hxvz.dll), as used in Microsoft Internet Explorer 5.01 SP4 and 6 SP1, in Windows XP SP2, Server 2003 SP1 and SP2, Vista SP1, and Server 2008, allows remote malicious users to execute arbitrary code via malformed arguments, which triggers memory corr...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Windows Xp
Microsoft Windows 2003 Server
Microsoft Windows-nt 2008
Microsoft Windows Vista
9.3
CVSSv2
CVE-2008-1087
Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote malicious users to execute arbitrary code via an EMF image file with crafted filename parameters, aka "GDI Stack Overflow Vulnerability.&qu...
Microsoft Windows Xp
Microsoft Windows 2003 Server
Microsoft Windows 2000
Microsoft Windows-nt 2008
Microsoft Windows Vista
2 EDB exploits
9
CVSSv2
CVE-2007-6033
Invensys Wonderware InTouch 8.0 creates a NetDDE share with insecure permissions (Everyone/Full Control), which allows remote authenticated attackers, and possibly anonymous users, to execute arbitrary programs.
Wonderware Intouch 8.0
7.2
CVSSv2
CVE-2007-1206
The Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0; 2000 SP4; XP SP2; Server 2003, 2003 SP1, and 2003 SP2; and Windows Vista before June 2006; uses insecure permissions (PAGE_READWRITE) for a physical memory view, which allows local users to gain priv...
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2003 Server Gold
Microsoft Windows 2003 Server Sp2
7.5
CVSSv2
CVE-2005-4560
The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote malicious users to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (S...
Microsoft Windows Xp
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2