cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2010-0232,https://securityvulnerability.io/vulnerability/CVE-2010-0232,,"The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges by crafting a VDM_TIB data structure in the Thread Environment Block (TEB), and then calling the NtVdmControl function to start the Windows Virtual DOS Machine (aka NTVDM) subsystem, leading to improperly handled exceptions involving the #GP trap handler (nt!KiTrap0D), aka ""Windows Kernel Exception Handler Vulnerability.""",Microsoft,"Windows Nt,Windows Server 2008,Windows Xp,Windows Vista,Windows 7,Windows 2000,Windows Server 2003",7.8,HIGH,0.010599999688565731,true,false,false,true,true,false,false,2010-01-21T19:00:00.000Z,0 CVE-2008-5232,https://securityvulnerability.io/vulnerability/CVE-2008-5232,,"Buffer overflow in the CallHTMLHelp method in the Microsoft Windows Media Services ActiveX control in nskey.dll 4.1.00.3917 in Windows Media Services on Microsoft Windows NT and 2000, and Avaya Media and Message Application servers, allows remote attackers to execute arbitrary code via a long argument. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.",Microsoft,"Windows Nt,Windows 2000",,,0.2651500105857849,false,false,false,false,,false,false,2008-11-26T01:00:00.000Z,0 CVE-2008-3014,https://securityvulnerability.io/vulnerability/CVE-2008-3014,,"Buffer overflow in gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed WMF image file that triggers improper memory allocation, aka ""GDI+ WMF Buffer Overrun Vulnerability.""",Microsoft,"Forefront Client Security,Server,Digital Image Suite,Internet Explorer,Office,Sql Server Reporting Services,Windows Vista,Visio,Windows-nt,Windows Xp,Sql Server,Report Viewer,Works,Office Powerpoint Viewer",,,0.8248999714851379,false,false,false,false,,false,false,2008-09-11T01:11:00.000Z,0 CVE-2008-3008,https://securityvulnerability.io/vulnerability/CVE-2008-3008,,"Stack-based buffer overflow in the WMEncProfileManager ActiveX control in wmex.dll in Microsoft Windows Media Encoder 9 Series allows remote attackers to execute arbitrary code via a long first argument to the GetDetailsString method, aka ""Windows Media Encoder Buffer Overrun Vulnerability.""",Microsoft,"Windows Media Encoder,Windows-nt,Windows 2000,Windows 2003 Server,Windows Xp",,,0.9672300219535828,false,false,false,false,,false,false,2008-09-11T01:11:00.000Z,0 CVE-2008-3012,https://securityvulnerability.io/vulnerability/CVE-2008-3012,,"gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka ""GDI+ EMF Memory Corruption Vulnerability.""",Microsoft,"Forefront Client Security,Office System,Server,Digital Image Suite,Internet Explorer,Office,Sql Server Reporting Services,Windows,Windows Vista,Visio,Windows-nt,Windows Xp,Sql Server,Report Viewer,Works,Office Powerpoint Viewer",,,0.6925600171089172,false,false,false,false,,false,false,2008-09-11T01:11:00.000Z,0 CVE-2007-5348,https://securityvulnerability.io/vulnerability/CVE-2007-5348,,"Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via an image file with crafted gradient sizes in gradient fill input, which triggers a heap-based buffer overflow related to GdiPlus.dll and VGX.DLL, aka ""GDI+ VML Buffer Overrun Vulnerability.""",Microsoft,"Forefront Client Security,Office System,Server,Digital Image Suite,Internet Explorer,Office,Sql Server Reporting Services,Windows,Windows Vista,Visio,Windows-nt,Windows Xp,Sql Server,Report Viewer,Works,Office Powerpoint Viewer",,,0.6690899729728699,false,false,false,false,,false,false,2008-09-11T01:01:00.000Z,0 CVE-2008-1456,https://securityvulnerability.io/vulnerability/CVE-2008-1456,,"Array index vulnerability in the Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote authenticated users to execute arbitrary code via a crafted event subscription request that is used to access an array of function pointers.",Microsoft,"Windows Xp,Windows 2000,Windows Vista,Windows-nt,Windows 2003 Server",,,0.5346599817276001,false,false,false,false,,false,false,2008-08-13T10:00:00.000Z,0 CVE-2008-1457,https://securityvulnerability.io/vulnerability/CVE-2008-1457,,"The Event System in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate per-user subscriptions, which allows remote authenticated users to execute arbitrary code via a crafted event subscription request.",Microsoft,"Windows Xp,Windows 2000,Windows Vista,Windows-nt,Windows 2003 Server",,,0.5346599817276001,false,false,false,false,,false,false,2008-08-13T10:00:00.000Z,0 CVE-2008-2246,https://securityvulnerability.io/vulnerability/CVE-2008-2246,,"Microsoft Windows Vista through SP1 and Server 2008 do not properly import the default IPsec policy from a Windows Server 2003 domain to a Windows Server 2008 domain, which prevents IPsec rules from being enforced and allows remote attackers to bypass intended access restrictions.",Microsoft,"Windows Vista,Windows-nt",,,0.3180299997329712,false,false,false,false,,false,false,2008-08-13T00:00:00.000Z,0 CVE-2008-1435,https://securityvulnerability.io/vulnerability/CVE-2008-1435,,"Windows Explorer in Microsoft Windows Vista up to SP1, and Server 2008, allows user-assisted remote attackers to execute arbitrary code via crafted saved-search (.search-ms) files that are not properly handled when saving, aka ""Windows Saved Search Vulnerability.""",Microsoft,"Windows Vista,Windows-nt",,,0.2660599946975708,false,false,false,false,,false,false,2008-07-08T23:41:00.000Z,0 CVE-2008-1445,https://securityvulnerability.io/vulnerability/CVE-2008-1445,,"Active Directory on Microsoft Windows 2000 Server SP4, XP Professional SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to cause a denial of service (system hang or reboot) via a crafted LDAP request.",Microsoft,"Windows 2003 Server,Windows Xp,Windows-nt",,,0.7858200073242188,false,false,false,false,,false,false,2008-06-12T01:30:00.000Z,0 CVE-2008-1453,https://securityvulnerability.io/vulnerability/CVE-2008-1453,,"The Bluetooth stack in Microsoft Windows XP SP2 and SP3, and Vista Gold and SP1, allows physically proximate attackers to execute arbitrary code via a large series of Service Discovery Protocol (SDP) packets.",Microsoft,"Windows Xp,Windows-nt,Windows Vista",,,0.014410000294446945,false,false,false,false,,false,false,2008-06-12T01:30:00.000Z,0 CVE-2008-1436,https://securityvulnerability.io/vulnerability/CVE-2008-1436,,"Microsoft Windows XP Professional SP2, Vista, and Server 2003 and 2008 does not properly assign activities to the (1) NetworkService and (2) LocalService accounts, which might allow context-dependent attackers to gain privileges by using one service process to capture a resource from a second service process that has a LocalSystem privilege-escalation ability, related to improper management of the SeImpersonatePrivilege user right, as originally reported for Internet Information Services (IIS), aka Token Kidnapping.",Microsoft,"Windows Xp,Windows Server 2003,Windows Server 2008,Windows Vista,Windows-nt",,,0.919730007648468,false,false,false,false,,false,false,2008-04-21T17:00:00.000Z,0 CVE-2008-0927,https://securityvulnerability.io/vulnerability/CVE-2008-0927,,dhost.exe in Novell eDirectory 8.7.3 before sp10 and 8.8.2 allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with (1) multiple Connection headers or (2) a Connection header with multiple comma-separated values. NOTE: this might be similar to CVE-2008-1777.,Microsoft,Windows-nt,,,0.9077399969100952,false,false,false,false,,false,false,2008-04-14T16:00:00.000Z,0 CVE-2008-0087,https://securityvulnerability.io/vulnerability/CVE-2008-0087,,"The DNS client in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, and Vista uses predictable DNS transaction IDs, which allows remote attackers to spoof DNS responses.",Microsoft,"Windows 2000,Windows Vista,Windows 2003 Server,Windows-nt",7.5,HIGH,0.5517899990081787,false,false,false,false,,false,false,2008-04-08T23:05:00.000Z,0 CVE-2008-1087,https://securityvulnerability.io/vulnerability/CVE-2008-1087,,"Stack-based buffer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, and Server 2008 allows remote attackers to execute arbitrary code via an EMF image file with crafted filename parameters, aka ""GDI Stack Overflow Vulnerability.""",Microsoft,"Windows Xp,Windows 2003 Server,Windows 2000,Windows-nt,Windows Vista",,,0.8257700204849243,false,false,false,false,,false,false,2008-04-08T23:05:00.000Z,0 CVE-2007-1973,https://securityvulnerability.io/vulnerability/CVE-2007-1973,,"Race condition in the Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0 allows local users to modify memory and gain privileges via the temporary \Device\PhysicalMemory section handle, a related issue to CVE-2007-1206.",Microsoft,Windows Nt,,,0.0004400000034365803,false,false,false,false,,false,false,2007-04-11T23:19:00.000Z,0 CVE-2007-1912,https://securityvulnerability.io/vulnerability/CVE-2007-1912,,Heap-based buffer overflow in Microsoft Windows allows user-assisted remote attackers to have an unknown impact via a crafted .HLP file.,Microsoft,"Windows Nt,Windows 2000,Windows 2003 Server,Windows Xp",,,0.10660000145435333,false,false,false,false,,false,false,2007-04-10T23:19:00.000Z,0 CVE-2006-5614,https://securityvulnerability.io/vulnerability/CVE-2006-5614,,"Microsoft Windows NAT Helper Components (ipnathlp.dll) on Windows XP SP2, when Internet Connection Sharing is enabled, allows remote attackers to cause a denial of service (svchost.exe crash) via a malformed DNS query, which results in a null pointer dereference.",Microsoft,Windows Nt Helper Components,,,0.9684200286865234,false,false,false,false,,false,false,2006-10-31T01:00:00.000Z,0 CVE-2006-2379,https://securityvulnerability.io/vulnerability/CVE-2006-2379,,"Buffer overflow in the TCP/IP Protocol driver in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via unknown vectors related to IP source routing.",Microsoft,"Windows Nt,Windows Xp,Windows 2003 Server,Windows 2000",,,0.9473099708557129,false,false,false,false,,false,false,2006-06-13T19:00:00.000Z,0 CVE-2006-1591,https://securityvulnerability.io/vulnerability/CVE-2006-1591,,Heap-based buffer overflow in Microsoft Windows Help winhlp32.exe allows user-assisted attackers to execute arbitrary code via crafted embedded image data in a .hlp file.,Microsoft,"Windows Nt,Windows Xp,Windows 2003 Server,Windows 2000",,,0.273389995098114,false,false,false,false,,false,false,2006-04-03T10:00:00.000Z,0 CVE-2006-0988,https://securityvulnerability.io/vulnerability/CVE-2006-0988,,"The default configuration of the DNS Server service on Windows Server 2003 and Windows 2000, and the Microsoft DNS Server service on Windows NT 4.0, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.",Microsoft,"Windows Nt,Windows 2000,Windows 2003 Server",,,0.09255000203847885,false,false,false,false,,false,false,2006-03-03T11:00:00.000Z,0 CVE-2006-0005,https://securityvulnerability.io/vulnerability/CVE-2006-0005,,"Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.",Microsoft,"Windows 2003 Server,Windows Server 2003,Windows Xp,Windows 2000,Windows 2000 Advanced Server,Windows-nt,Windows Server 2000",,,0.9509000182151794,false,false,false,false,,false,false,2006-02-14T19:00:00.000Z,0 CVE-2006-0010,https://securityvulnerability.io/vulnerability/CVE-2006-0010,,"Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote attackers to execute arbitrary code via an e-mail message or web page with a crafted Embedded Open Type (EOT) web font that triggers the overflow during decompression.",Microsoft,"Windows Nt,Windows Xp,Windows 2003 Server,Windows 2000,Windows 98se,Windows Me,Windows 98",,,0.8386200070381165,false,false,false,false,,false,false,2006-01-10T22:00:00.000Z,0 CVE-2005-2827,https://securityvulnerability.io/vulnerability/CVE-2005-2827,,"The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the ""Windows Kernel Vulnerability.""",Microsoft,"Windows Nt,Windows 2000",,,0.0005200000014156103,false,false,false,false,,false,false,2005-12-14T01:00:00.000Z,0