Vulnerabilities > Microsoft > Windows XP
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-02-20 | CVE-2012-5364 | Resource Exhaustion vulnerability in Microsoft products The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries. | 7.5 |
2020-02-20 | CVE-2012-5362 | Resource Exhaustion vulnerability in Microsoft products The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2010-4669. | 7.5 |
2019-12-10 | CVE-2019-1489 | Information Exposure vulnerability in Microsoft Windows XP An information disclosure vulnerability exists when the Windows Remote Desktop Protocol (RDP) fails to properly handle objects in memory, aka 'Remote Desktop Protocol Information Disclosure Vulnerability'. | 7.5 |
2017-06-22 | CVE-2017-0176 | Classic Buffer Overflow vulnerability in Microsoft Windows Server 2003 and Windows XP A buffer overflow in Smart Card authentication code in gpkcsp.dll in Microsoft Windows XP through SP3 and Server 2003 through SP2 allows a remote attacker to execute arbitrary code on the target computer, provided that the computer is joined in a Windows domain and has Remote Desktop Protocol connectivity (or Terminal Services) enabled. | 8.1 |
2017-06-15 | CVE-2017-8487 | Unspecified vulnerability in Microsoft Windows Server 2003 and Windows XP Windows OLE in Windows XP and Windows Server 2003 allows an attacker to execute code when a victim opens a specially crafted file or program aka "Windows olecnv32.dll Remote Code Execution Vulnerability." | 7.8 |
2017-06-15 | CVE-2017-8461 | Unspecified vulnerability in Microsoft Windows Server 2003 and Windows XP Windows RPC with Routing and Remote Access enabled in Windows XP and Windows Server 2003 allows an attacker to execute code on a targeted RPC server which has Routing and Remote Access enabled via a specially crafted application, aka "Windows RPC Remote Code Execution Vulnerability." | 7.8 |
2013-11-28 | CVE-2013-5065 | Unspecified vulnerability in Microsoft Windows 2003 Server and Windows XP NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013. | 7.8 |
2013-05-24 | CVE-2013-3660 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability." | 7.8 |
2012-04-10 | CVE-2012-0151 | Improper Input Validation vulnerability in Microsoft products The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka "WinVerifyTrust Signature Validation Vulnerability." | 7.8 |
2011-10-12 | CVE-2011-2005 | Unspecified vulnerability in Microsoft Windows Server 2003 and Windows XP afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability." | 7.8 |