Search Results (3090 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2010-0018 1 Microsoft 6 Windows 2000, Windows 2003 Server, Windows 7 and 3 more 2025-04-09 N/A
Integer overflow in the Embedded OpenType (EOT) Font Engine (t2embed.dll) in Microsoft Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code via compressed data that represents a crafted EOT font, aka "Microtype Express Compressed Fonts Integer Flaw in the LZCOMP Decompressor Vulnerability."
CVE-2009-4215 2 Microsoft, Pandasecurity 6 Windows 7, Windows Vista, Windows Xp and 3 more 2025-04-09 N/A
Panda Global Protection 2010, Internet Security 2010, and Antivirus Pro 2010 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs.
CVE-2009-3676 1 Microsoft 2 Windows 7, Windows Server 2008 2025-04-09 N/A
The SMB client in the kernel in Microsoft Windows Server 2008 R2 and Windows 7 allows remote SMB servers and man-in-the-middle attackers to cause a denial of service (infinite loop and system hang) via a (1) SMBv1 or (2) SMBv2 response packet that contains (a) an incorrect length value in a NetBIOS header or (b) an additional length field at the end of this response packet, aka "SMB Client Incomplete Response Vulnerability."
CVE-2009-3674 1 Microsoft 7 Internet Explorer, Windows 2000, Windows 7 and 4 more 2025-04-09 N/A
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671.
CVE-2009-3673 1 Microsoft 7 Internet Explorer, Windows 2000, Windows 7 and 4 more 2025-04-09 N/A
Microsoft Internet Explorer 7 and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
CVE-2009-3671 1 Microsoft 8 Ie, Internet Explorer, Windows 2000 and 5 more 2025-04-09 8.1 High
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3674.
CVE-2009-3294 2 Microsoft, Php 4 Windows 7, Windows Server 2008, Windows Xp and 1 more 2025-04-09 N/A
The popen API function in TSRM/tsrm_win32.c in PHP before 5.2.11 and 5.3.x before 5.3.1, when running on certain Windows operating systems, allows context-dependent attackers to cause a denial of service (crash) via a crafted (1) "e" or (2) "er" string in the second argument (aka mode), possibly related to the _fdopen function in the Microsoft C runtime library. NOTE: this might not cross privilege boundaries except in rare cases in which the mode argument is accessible to an attacker outside of an application that uses the popen function.
CVE-2009-2764 1 Microsoft 2 Internet Explorer, Windows 7 2025-04-09 N/A
Microsoft Internet Explorer 8.0.7100.0 on Windows 7 RC on the x64 platform allows remote attackers to cause a denial of service (application crash) via a certain DIV element in conjunction with SCRIPT elements that have empty contents and no reference to a valid external script location.
CVE-2018-0878 1 Microsoft 7 Windows 10, Windows 7, Windows 8.1 and 4 more 2025-04-04 3.1 Low
Windows Remote Assistance in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how XML External Entities (XXE) are processed, aka "Windows Remote Assistance Information Disclosure Vulnerability".
CVE-2022-30170 1 Microsoft 21 Windows 10, Windows 10 1507, Windows 10 1607 and 18 more 2025-03-11 7.3 High
Windows Credential Roaming Service Elevation of Privilege Vulnerability
CVE-2022-37958 1 Microsoft 18 Windows 10, Windows 10 1507, Windows 10 1607 and 15 more 2025-03-11 8.1 High
SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
CVE-2022-38006 1 Microsoft 19 Windows 10, Windows 10 1507, Windows 10 1607 and 16 more 2025-03-11 6.5 Medium
Windows Graphics Component Information Disclosure Vulnerability
CVE-2022-38005 1 Microsoft 19 Windows 10, Windows 10 1507, Windows 10 1607 and 16 more 2025-03-11 7.8 High
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2022-38004 1 Microsoft 19 Windows 10, Windows 10 1507, Windows 10 1607 and 16 more 2025-03-11 7.8 High
Windows Fax Service Remote Code Execution Vulnerability
CVE-2022-37956 1 Microsoft 19 Windows 10, Windows 10 1507, Windows 10 1607 and 16 more 2025-03-11 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2022-37955 1 Microsoft 19 Windows 10, Windows 10 1507, Windows 10 1607 and 16 more 2025-03-11 7.8 High
Windows Group Policy Elevation of Privilege Vulnerability
CVE-2022-34734 1 Microsoft 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more 2025-03-11 8.8 High
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVE-2022-34733 1 Microsoft 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more 2025-03-11 8.8 High
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2022-34732 1 Microsoft 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more 2025-03-11 8.8 High
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVE-2022-34731 1 Microsoft 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more 2025-03-11 8.8 High
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability