Vulnerability Report: Microsoft Windows 2000 Professional

This vulnerability report for Microsoft Windows 2000 Professional contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Microsoft Windows 2000 Professional then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2015
2.2. Statistics for 2014
2.3. Statistics for 2013
2.4. Statistics for 2012
2.5. Statistics for 2011
2.6. Statistics for 2010
2.7. Statistics for 2009
2.8. Statistics for 2008
2.9. Statistics for 2007
2.10. Statistics for 2006
2.11. Statistics for 2005
2.12. Statistics for 2004
2.13. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2015
3.2. List for 2014
3.3. List for 2013
3.4. List for 2012
3.5. List for 2011
3.6. List for 2010
3.7. List for 2009
3.8. List for 2008
3.9. List for 2007
3.10. List for 2006
3.11. List for 2005
3.12. List for 2004
3.13. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Microsoft

Product Link View Here (Link to external site)

Affected By 249 Secunia advisories
293 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 11% (27 of 249 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Microsoft Windows 2000 Professional, with all vendor patches applied, is rated Highly critical .




249 Secunia Advisories in 2003-2015

Secunia has issued a total of 249 Secunia advisories in 2003-2015 for Microsoft Windows 2000 Professional. Currently, 11% (27 out of 249) are marked as unpatched with the most severe being rated Highly critical

More information about the specific Secunia advisories affecting Microsoft Windows 2000 Professional can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



unpatched Microsoft Windows Environment Variable Expansion Library Loading Vulnerability
Unpatched. Secunia Advisory 1 of 25 in 2010. 10,184 views.
Release Date:
2010-10-28
Secunia Advisory ID:
SA41984
Solution Status:
Unpatched
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


patched Microsoft Windows MFC Document Title Updating Buffer Overflow
Vendor Patch. Secunia Advisory 2 of 25 in 2010. 18,442 views.
Release Date:
2010-07-05
Secunia Advisory ID:
SA40298
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Data Analyzer ActiveX Control Vulnerability
Vendor Patch. Secunia Advisory 3 of 25 in 2010. 7,844 views.
Release Date:
2010-06-08
Secunia Advisory ID:
SA40059
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Data Analyzer, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Kernel-Mode Drivers Three Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 25 in 2010. 5,072 views.
Release Date:
2010-06-08
Secunia Advisory ID:
SA39655
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Three vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to potentially compromise a user's system. [Read More]


patched Microsoft Windows OpenType Compact Font Format Driver Vulnerability
Vendor Patch. Secunia Advisory 5 of 25 in 2010. 5,495 views.
Release Date:
2010-06-08
Secunia Advisory ID:
SA38176
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Chris Carton has discovered a vulnerability in Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


patched Microsoft Windows Media Decompression Two Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 25 in 2010. 4,372 views.
Release Date:
2010-06-08
Secunia Advisory ID:
SA40058
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Outlook Express / Windows Mail STAT Response Integer Overflow
Vendor Patch. Secunia Advisory 7 of 25 in 2010. 13,433 views.
Release Date:
2010-05-11
Secunia Advisory ID:
SA39766
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Francis Provencher has discovered a vulnerability in Microsoft Outlook Express and Windows Mail, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


patched Microsoft Windows SMB Client Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 8 of 25 in 2010. 5,796 views.
Release Date:
2010-04-13
Secunia Advisory ID:
SA39372
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows MPEG Layer-3 Codecs Buffer Overflow
Vendor Patch. Secunia Advisory 9 of 25 in 2010. 5,729 views.
Release Date:
2010-04-13
Secunia Advisory ID:
SA39379
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Authentication Verification Two Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 25 in 2010. 7,021 views.
Release Date:
2010-04-13
Secunia Advisory ID:
SA39371
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Kernel Privilege Escalation and Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 25 in 2010. 4,586 views.
Release Date:
2010-04-13
Secunia Advisory ID:
SA39373
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


patched Microsoft Exchange / Windows SMTP Service Two Vulnerabilities
Vendor Patch. Secunia Advisory 12 of 25 in 2010. 4,388 views.
Release Date:
2010-04-13
Secunia Advisory ID:
SA39376
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Microsoft Windows and Exchange Server, which can be exploited by malicious people to cause a DoS (Denial of Service) or gain knowledge of sensitive information. [Read More]


unpatched Microsoft Windows HTML Help File Processing Vulnerability
Unpatched. Secunia Advisory 13 of 25 in 2010. 7,488 views.
Release Date:
2010-03-11
Secunia Advisory ID:
SA38916
Solution Status:
Unpatched
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Eduardo Prado has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


patched Microsoft Windows "MsgBox()" HLP File Execution Vulnerability
Vendor Patch. Secunia Advisory 14 of 25 in 2010. 12,395 views.
Release Date:
2010-03-01
Secunia Advisory ID:
SA38727
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Maurycy Prodeus has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Kerberos Ticket Renewal Request Denial of Service
Vendor Patch. Secunia Advisory 15 of 25 in 2010. 4,072 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA38512
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Shell Handler Input Validation Vulnerability
Vendor Patch. Secunia Advisory 16 of 25 in 2010. 4,940 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA38501
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows SMB Server Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 25 in 2010. 6,933 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA38510
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Brute force
DoS
System access
Where:
From local network
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct brute force attacks or to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Paint JPEG Parsing Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 18 of 25 in 2010. 8,647 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA36634
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Tielei Wang has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows SMB Client Implementation Vulnerabilities
Vendor Patch. Secunia Advisory 19 of 25 in 2010. 5,692 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA38500
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows CSRSS Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 20 of 25 in 2010. 4,003 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA38509
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


unpatched Microsoft Windows TLS/SSL Session Renegotiation Plaintext Injection Vulnerability
Unpatched. Secunia Advisory 21 of 25 in 2010. 5,530 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA38365
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
Manipulation of data
Where:
From remote
Short Description:
Microsoft has acknowledged a vulnerability in Microsoft Windows, which can be exploited by malicious people to manipulate certain data. [Read More]


patched Microsoft DirectShow AVI File Parsing Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 22 of 25 in 2010. 13,735 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA38511
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Data Analyzer ActiveX Control Vulnerability
Vendor Patch. Secunia Advisory 23 of 25 in 2010. 5,758 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA38503
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Data Analyzer, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Two Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 24 of 25 in 2010. 14,550 views.
Release Date:
2010-01-20
Secunia Advisory ID:
SA38265
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows Embedded OpenType Font Engine Vulnerability
Vendor Patch. Secunia Advisory 25 of 25 in 2010. 7,172 views.
Release Date:
2010-01-12
Secunia Advisory ID:
SA35457
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


unpatched Microsoft Windows Indeo Codec Multiple Vulnerabilities
Unpatched. Secunia Advisory 1 of 29 in 2009. 11,222 views.
Release Date:
2009-12-08
Secunia Advisory ID:
SA37592
Solution Status:
Unpatched
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows MS-CHAP Authentication Bypass
Vendor Patch. Secunia Advisory 2 of 29 in 2009. 4,758 views.
Release Date:
2009-12-08
Secunia Advisory ID:
SA37543
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Microsoft WordPad / Office Text Converters Integer Overflow Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 29 in 2009. 10,616 views.
Release Date:
2009-12-08
Secunia Advisory ID:
SA37580
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows and Microsoft Office, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Local Security Authority Subsystem Denial of Service
Vendor Patch. Secunia Advisory 4 of 29 in 2009. 4,684 views.
Release Date:
2009-12-08
Secunia Advisory ID:
SA37524
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Win32k Kernel-Mode Driver Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 29 in 2009. 11,075 views.
Release Date:
2009-11-10
Secunia Advisory ID:
SA37318
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Privilege Escalation and Denial of Service
Vendor Patch. Secunia Advisory 6 of 29 in 2009. 5,246 views.
Release Date:
2009-10-14
Secunia Advisory ID:
SA37001
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to potentially gain escalated privileges. [Read More]


patched Microsoft Windows ActiveX Controls ATL "OleLoadFromStream()" Vulnerability
Vendor Patch. Secunia Advisory 7 of 29 in 2009. 8,420 views.
Release Date:
2009-10-13
Secunia Advisory ID:
SA36997
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. [Read More]


patched Microsoft Windows Media Runtime Code Execution Vulnerability
Vendor Patch. Secunia Advisory 8 of 29 in 2009. 6,817 views.
Release Date:
2009-10-13
Secunia Advisory ID:
SA36938
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Indexing Service ActiveX Control Memory Corruption
Vendor Patch. Secunia Advisory 9 of 29 in 2009. 5,614 views.
Release Date:
2009-10-13
Secunia Advisory ID:
SA37000
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


patched Microsoft Windows CryptoAPI Two Spoofing Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 29 in 2009. 5,926 views.
Release Date:
2009-10-13
Secunia Advisory ID:
SA36999
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


patched Microsoft JScript Scripting Engine Memory Corruption Vulnerability
Vendor Patch. Secunia Advisory 11 of 29 in 2009. 5,958 views.
Release Date:
2009-09-08
Secunia Advisory ID:
SA36551
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Media Format Two Code Execution Vulnerabilities
Vendor Patch. Secunia Advisory 12 of 29 in 2009. 7,290 views.
Release Date:
2009-09-08
Secunia Advisory ID:
SA36596
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows Media Format, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Windows 2000 / XP TCP/IP Window Size Denial of Service Vulnerabilities
Unpatched. Secunia Advisory 13 of 29 in 2009. 10,591 views.
Release Date:
2009-09-08
Secunia Advisory ID:
SA36597
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows 2000 and Windows XP, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows DHTML Editing ActiveX Control Vulnerability
Vendor Patch. Secunia Advisory 14 of 29 in 2009. 5,247 views.
Release Date:
2009-09-08
Secunia Advisory ID:
SA36592
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Telnet NTLM Credential Reflection Vulnerability
Vendor Patch. Secunia Advisory 15 of 29 in 2009. 6,491 views.
Release Date:
2009-08-11
Secunia Advisory ID:
SA36222
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows AVI Media File Parsing Vulnerabilities
Vendor Patch. Secunia Advisory 16 of 29 in 2009. 6,128 views.
Release Date:
2009-08-11
Secunia Advisory ID:
SA36206
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Message Queuing Service Privilege Escalation
Vendor Patch. Secunia Advisory 17 of 29 in 2009. 6,590 views.
Release Date:
2009-08-11
Secunia Advisory ID:
SA36214
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows Various Components ATL Vulnerabilities
Vendor Patch. Secunia Advisory 18 of 29 in 2009. 18,929 views.
Release Date:
2009-08-11
Secunia Advisory ID:
SA36187
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in various Windows components, which can be exploited by malicious people to bypass security features or compromise a user's system. [Read More]


patched Microsoft Remote Desktop Connection Two Vulnerabilities
Vendor Patch. Secunia Advisory 19 of 29 in 2009. 13,450 views.
Release Date:
2009-08-11
Secunia Advisory ID:
SA36229
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows and Microsoft Remote Desktop Connection Client for Mac, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Windows Embedded OpenType Font Engine Two Vulnerabilities
Vendor Patch. Secunia Advisory 20 of 29 in 2009. 12,132 views.
Release Date:
2009-07-14
Secunia Advisory ID:
SA35773
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Print Spooler Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 21 of 29 in 2009. 10,000 views.
Release Date:
2009-06-09
Secunia Advisory ID:
SA35365
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of system information
Exposure of sensitive information
System access
Where:
From local network
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to disclose sensitive information, and by malicious users and malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Kernel Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 22 of 29 in 2009. 7,916 views.
Release Date:
2009-06-09
Secunia Advisory ID:
SA35372
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows RPC Marshalling Engine Vulnerability
Vendor Patch. Secunia Advisory 23 of 29 in 2009. 8,862 views.
Release Date:
2009-06-09
Secunia Advisory ID:
SA35373
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


patched Microsoft Windows "SystemParametersInfo()" Privilege Escalation
Vendor Patch. Secunia Advisory 24 of 29 in 2009. 6,325 views.
Release Date:
2009-06-03
Secunia Advisory ID:
SA35323
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft DirectShow QuickTime Parsing Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 25 of 29 in 2009. 15,539 views.
Release Date:
2009-05-29
Secunia Advisory ID:
SA35268
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Microsoft DirectX, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows HTTP Services Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 26 of 29 in 2009. 13,975 views.
Release Date:
2009-04-14
Secunia Advisory ID:
SA34677
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Spoofing
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to conduct spoofing attacks or compromise a user's system. [Read More]


patched Microsoft DirectShow MJPEG Decompression Vulnerability
Vendor Patch. Secunia Advisory 27 of 29 in 2009. 9,608 views.
Release Date:
2009-04-14
Secunia Advisory ID:
SA34665
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft DirectX, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


patched Microsoft Windows SChannel Authentication Bypass
Vendor Patch. Secunia Advisory 28 of 29 in 2009. 11,525 views.
Release Date:
2009-03-10
Secunia Advisory ID:
SA34215
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security mechanisms. [Read More]


patched Microsoft Windows Multiple Kernel Vulnerabilities
Vendor Patch. Secunia Advisory 29 of 29 in 2009. 12,246 views.
Release Date:
2009-03-10
Secunia Advisory ID:
SA34117
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Three vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to potentially compromise a user's system. [Read More]


patched Microsoft Windows WordPad / Office Text Converters Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 26 in 2008. 19,563 views.
Release Date:
2008-12-09
Secunia Advisory ID:
SA32997
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Microsoft Windows and Microsoft Office, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows GDI Image Parsing Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 26 in 2008. 14,458 views.
Release Date:
2008-12-09
Secunia Advisory ID:
SA33020
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


patched Microsoft Windows SMB Authentication Credential Replay Vulnerability
Vendor Patch. Secunia Advisory 3 of 26 in 2008. 14,285 views.
Release Date:
2008-11-11
Secunia Advisory ID:
SA32633
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Spoofing
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security features. [Read More]


patched Microsoft Windows Path Canonicalisation Vulnerability
Vendor Patch. Secunia Advisory 4 of 26 in 2008. 36,021 views.
Release Date:
2008-10-23
Secunia Advisory ID:
SA32326
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows SMB Buffer Underflow Vulnerability
Vendor Patch. Secunia Advisory 5 of 26 in 2008. 23,237 views.
Release Date:
2008-10-14
Secunia Advisory ID:
SA32249
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows IIS IPP Service Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 6 of 26 in 2008. 13,779 views.
Release Date:
2008-10-14
Secunia Advisory ID:
SA32248
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Microsoft Windows 2000 Message Queuing Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 26 in 2008. 8,135 views.
Release Date:
2008-10-14
Secunia Advisory ID:
SA32260
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows 2000, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 8 of 26 in 2008. 9,641 views.
Release Date:
2008-10-14
Secunia Advisory ID:
SA32247
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


patched Microsoft Windows SMB Packet Handling Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 26 in 2008. 16,154 views.
Release Date:
2008-09-16
Secunia Advisory ID:
SA31883
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Three vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


unpatched Microsoft Windows "IopfCompleteRequest" Integer Overflow Vulnerability
Unpatched. Secunia Advisory 10 of 26 in 2008. 11,606 views.
Release Date:
2008-09-10
Secunia Advisory ID:
SA31824
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Ruben Santamarta has reported a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows Event System Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 26 in 2008. 11,036 views.
Release Date:
2008-08-12
Secunia Advisory ID:
SA31417
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows Color Management System Buffer Overflow
Vendor Patch. Secunia Advisory 12 of 26 in 2008. 14,110 views.
Release Date:
2008-08-12
Secunia Advisory ID:
SA31385
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft SQL Server and MSDE Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 13 of 26 in 2008. 17,378 views.
Release Date:
2008-07-08
Secunia Advisory ID:
SA30970
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Privilege escalation
Where:
From local network
Short Description:
Four vulnerabilities have been reported in Microsoft SQL Server, which can be exploited by malicious users to gain escalated privileges. [Read More]


patched Microsoft Windows DNS Spoofing Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 26 in 2008. 14,428 views.
Release Date:
2008-07-08
Secunia Advisory ID:
SA30925
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to poison the DNS cache. [Read More]


patched Microsoft DirectX MJPEG/SAMI File Processing Vulnerabilities
Vendor Patch. Secunia Advisory 15 of 26 in 2008. 13,825 views.
Release Date:
2008-06-10
Secunia Advisory ID:
SA30579
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft DirectX, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Speech Recognition Security Issue
Vendor Patch. Secunia Advisory 16 of 26 in 2008. 12,122 views.
Release Date:
2008-06-10
Secunia Advisory ID:
SA30578
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
A security issue has been reported in Microsoft Windows, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 26 in 2008. 21,969 views.
Release Date:
2008-04-18
Secunia Advisory ID:
SA29867
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Microsoft Windows Kernel Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 18 of 26 in 2008. 14,650 views.
Release Date:
2008-04-08
Secunia Advisory ID:
SA29720
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows hxvz.dll ActiveX Control Memory Corruption
Vendor Patch. Secunia Advisory 19 of 26 in 2008. 15,589 views.
Release Date:
2008-04-08
Secunia Advisory ID:
SA29714
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows GDI Image Parsing Buffer Overflows
Vendor Patch. Secunia Advisory 20 of 26 in 2008. 15,106 views.
Release Date:
2008-04-08
Secunia Advisory ID:
SA29704
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows DNS Client Predictable Transaction ID Vulnerability
Vendor Patch. Secunia Advisory 21 of 26 in 2008. 13,919 views.
Release Date:
2008-04-08
Secunia Advisory ID:
SA29696
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to poison the DNS cache. [Read More]


patched Microsoft VBScript/JScript Script Decoding Buffer Overflow
Vendor Patch. Secunia Advisory 22 of 26 in 2008. 15,881 views.
Release Date:
2008-04-08
Secunia Advisory ID:
SA29712
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows "NoDriveTypeAutoRun" Security Issue
Vendor Patch. Secunia Advisory 23 of 26 in 2008. 22,394 views.
Release Date:
2008-03-21
Secunia Advisory ID:
SA29458
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Security Bypass
Where:
Local system
Short Description:
CERT/CC has reported a security issue in Windows, which can be exploited by malicious people to bypass certain security settings. [Read More]


patched Microsoft Windows OLE Automation Memory Corruption
Vendor Patch. Secunia Advisory 24 of 26 in 2008. 16,215 views.
Release Date:
2008-02-12
Secunia Advisory ID:
SA28902
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows LSASS Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 25 of 26 in 2008. 16,793 views.
Release Date:
2008-01-08
Secunia Advisory ID:
SA28341
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows TCP/IP Implementation Vulnerabilities
Vendor Patch. Secunia Advisory 26 of 26 in 2008. 29,778 views.
Release Date:
2008-01-08
Secunia Advisory ID:
SA28297
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Microsoft Windows Message Queuing Privilege Escalation
Vendor Patch. Secunia Advisory 1 of 24 in 2007. 14,135 views.
Release Date:
2007-12-11
Secunia Advisory ID:
SA28011
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft DirectX SAMI/WAV/AVI File Parsing Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 24 in 2007. 20,113 views.
Release Date:
2007-12-11
Secunia Advisory ID:
SA28010
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft DirectX, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Windows Media Format Runtime ASF Parsing Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 24 in 2007. 20,725 views.
Release Date:
2007-12-11
Secunia Advisory ID:
SA28034
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
IBM X-Force has reported four vulnerabilities in Windows Media Format Runtime / Windows Media Services, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Web Proxy Auto-Discovery Feature Security Issue
Vendor Workaround. Secunia Advisory 4 of 24 in 2007. 24,897 views.
Release Date:
2007-12-04
Secunia Advisory ID:
SA27901
Solution Status:
Vendor Workaround
Criticality:
Less critical
Impact:
Security Bypass
Exposure of sensitive information
Where:
From remote
Short Description:
A security issue has been reported in Microsoft's Web Proxy Auto-Discovery (WPAD) feature, which can be exploited by malicious people to conduct man-in-the-middle (MITM) attacks. [Read More]


patched Microsoft Windows Kodak Image Viewer Code Execution
Vendor Patch. Secunia Advisory 5 of 24 in 2007. 21,611 views.
Release Date:
2007-10-09
Secunia Advisory ID:
SA27092
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows 2000 RPC Authentication Information Disclosure
Vendor Patch. Secunia Advisory 6 of 24 in 2007. 16,774 views.
Release Date:
2007-10-09
Secunia Advisory ID:
SA27153
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows 2000, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


patched Microsoft Windows NNTP Response Handling Buffer Overflow
Vendor Patch. Secunia Advisory 7 of 24 in 2007. 20,081 views.
Release Date:
2007-10-09
Secunia Advisory ID:
SA27112
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
VeriSign iDefense Labs has reported a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Agent ActiveX Control URL Handling Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 8 of 24 in 2007. 18,036 views.
Release Date:
2007-09-11
Secunia Advisory ID:
SA26753
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows 2000, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Windows Graphics Rendering Engine Image Handling Vulnerability
Vendor Patch. Secunia Advisory 9 of 24 in 2007. 16,888 views.
Release Date:
2007-08-14
Secunia Advisory ID:
SA26423
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Vector Markup Language Buffer Overflow
Vendor Patch. Secunia Advisory 10 of 24 in 2007. 19,743 views.
Release Date:
2007-08-14
Secunia Advisory ID:
SA26409
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows OLE Automation "substringData()" Integer Overflow
Vendor Patch. Secunia Advisory 11 of 24 in 2007. 17,985 views.
Release Date:
2007-08-14
Secunia Advisory ID:
SA26449
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Win32 API Code Execution Vulnerability
Vendor Patch. Secunia Advisory 12 of 24 in 2007. 22,336 views.
Release Date:
2007-06-12
Secunia Advisory ID:
SA25640
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a user's system. [Read More]


patched Windows Secure Channel Digital Signature Parsing Vulnerability
Vendor Patch. Secunia Advisory 13 of 24 in 2007. 19,924 views.
Release Date:
2007-06-12
Secunia Advisory ID:
SA25620
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Microsoft Agent URL Parsing Memory Corruption Vulnerability
Vendor Patch. Secunia Advisory 14 of 24 in 2007. 21,369 views.
Release Date:
2007-04-10
Secunia Advisory ID:
SA22896
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Secunia Research has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Kernel Mapped Memory Insecure Permissions
Vendor Patch. Secunia Advisory 15 of 24 in 2007. 15,996 views.
Release Date:
2007-04-10
Secunia Advisory ID:
SA24834
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
eEye Digital Security has reported a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows Animated Cursor Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 16 of 24 in 2007. 96,671 views.
Release Date:
2007-03-30
Secunia Advisory ID:
SA24659
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


unpatched Microsoft Windows Directory Monitoring Information Disclosure Weakness
Unpatched. Secunia Advisory 17 of 24 in 2007. 21,375 views.
Release Date:
2007-02-23
Secunia Advisory ID:
SA24245
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
Exposure of sensitive information
Exposure of system information
Where:
Local system
Short Description:
3APA3A has discovered a weakness in Microsoft Windows, which can be exploited by malicious, local users to gain knowledge of certain information. [Read More]


patched Microsoft RichEdit OLE Dialog Memory Corruption Vulnerability
Vendor Patch. Secunia Advisory 18 of 24 in 2007. 18,879 views.
Release Date:
2007-02-13
Secunia Advisory ID:
SA24152
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows and Microsoft Office, which can be exploited by malicious people to compromise a users system. [Read More]


patched Microsoft MFC OLE Dialog Memory Corruption Vulnerability
Vendor Patch. Secunia Advisory 19 of 24 in 2007. 17,625 views.
Release Date:
2007-02-13
Secunia Advisory ID:
SA24150
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows and Visual Studio, which can be exploited by malicious people to compromise a users system. [Read More]


patched Microsoft Windows OLE Dialog Memory Corruption Vulnerability
Vendor Patch. Secunia Advisory 20 of 24 in 2007. 14,936 views.
Release Date:
2007-02-13
Secunia Advisory ID:
SA24147
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft MDAC ADODB.Connection ActiveX Control Vulnerability
Vendor Patch. Secunia Advisory 21 of 24 in 2007. 26,793 views.
Release Date:
2007-02-13
Secunia Advisory ID:
SA22452
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Yag Kohha has reported a vulnerability in Microsoft Data Access Components, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows HTML Help ActiveX Control Vulnerability
Vendor Patch. Secunia Advisory 22 of 24 in 2007. 16,967 views.
Release Date:
2007-02-13
Secunia Advisory ID:
SA24136
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft XML Core Services Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 23 of 24 in 2007. 77,880 views.
Release Date:
2007-01-09
Secunia Advisory ID:
SA23655
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Microsoft XML Core Services, which can be exploited by malicious people to gain knowledge of sensitive information or potentially compromise a user's system. [Read More]


patched Microsoft Windows Vector Markup Language Vulnerabilities
Vendor Patch. Secunia Advisory 24 of 24 in 2007. 41,164 views.
Release Date:
2007-01-09
Secunia Advisory ID:
SA23677
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system [Read More]


patched Microsoft Windows CSRSS Information Disclosure Vulnerability
Vendor Patch. Secunia Advisory 1 of 40 in 2006. 21,083 views.
Release Date:
2006-12-28
Secunia Advisory ID:
SA23491
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Rubén Santamarta has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain knowledge of sensitive information. [Read More]


unpatched Windows Workstation Service NetrWkstaUserEnum Denial of Service
Unpatched. Secunia Advisory 2 of 40 in 2006. 27,249 views.
Release Date:
2006-12-26
Secunia Advisory ID:
SA23487
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
From local network
Short Description:
h07 has discovered a weakness in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows CSRSS MsgBox Memory Corruption Vulnerability
Vendor Patch. Secunia Advisory 3 of 40 in 2006. 39,224 views.
Release Date:
2006-12-22
Secunia Advisory ID:
SA23448
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Windows Remote Installation Service Writable Path Vulnerability
Vendor Patch. Secunia Advisory 4 of 40 in 2006. 15,495 views.
Release Date:
2006-12-12
Secunia Advisory ID:
SA23312
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Outlook Express Address Book Contact Record Vulnerability
Vendor Patch. Secunia Advisory 5 of 40 in 2006. 17,317 views.
Release Date:
2006-12-12
Secunia Advisory ID:
SA23311
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Outlook Express, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows SNMP Service GetBulkRequest Memory Corruption
Vendor Patch. Secunia Advisory 6 of 40 in 2006. 20,912 views.
Release Date:
2006-12-12
Secunia Advisory ID:
SA23307
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Windows Media Format Runtime ASX/ASF Parsing Vulnerabilities
Vendor Patch. Secunia Advisory 7 of 40 in 2006. 23,887 views.
Release Date:
2006-12-08
Secunia Advisory ID:
SA22971
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Windows Media Format Runtime, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


unpatched Microsoft Windows Print Spooler Denial of Service Vulnerability
Unpatched. Secunia Advisory 8 of 40 in 2006. 27,511 views.
Release Date:
2006-12-04
Secunia Advisory ID:
SA23196
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
h07 has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Agent ActiveX Control Buffer Overflow
Vendor Patch. Secunia Advisory 9 of 40 in 2006. 23,841 views.
Release Date:
2006-11-14
Secunia Advisory ID:
SA22878
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Workstation Service Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 10 of 40 in 2006. 21,944 views.
Release Date:
2006-11-14
Secunia Advisory ID:
SA22883
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
eEye Digital Security has reported a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Windows Active Directory Unspecified Denial of Service
Unpatched. Secunia Advisory 11 of 40 in 2006. 24,060 views.
Release Date:
2006-11-14
Secunia Advisory ID:
SA22871
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
GLEG has reported a vulnerability in Microsoft Windows, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Client Service for Netware Vulnerabilities
Vendor Patch. Secunia Advisory 12 of 40 in 2006. 25,496 views.
Release Date:
2006-11-14
Secunia Advisory ID:
SA22866
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


patched Microsoft Windows GDI Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 13 of 40 in 2006. 26,771 views.
Release Date:
2006-11-06
Secunia Advisory ID:
SA22668
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


patched Microsoft XMLHTTP ActiveX Control Code Execution Vulnerability
Vendor Patch. Secunia Advisory 14 of 40 in 2006. 86,092 views.
Release Date:
2006-11-04
Secunia Advisory ID:
SA22687
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Microsoft XML Core Services, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Shell Code Execution Vulnerability
Vendor Patch. Secunia Advisory 15 of 40 in 2006. 46,885 views.
Release Date:
2006-09-28
Secunia Advisory ID:
SA22159
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
H D Moore has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Vector Graphics Rendering Library Buffer Overflow
Vendor Patch. Secunia Advisory 16 of 40 in 2006. 79,685 views.
Release Date:
2006-09-19
Secunia Advisory ID:
SA21989
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Indexing Service Cross-Site Scripting
Vendor Patch. Secunia Advisory 17 of 40 in 2006. 17,836 views.
Release Date:
2006-09-12
Secunia Advisory ID:
SA21861
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Eiji James Yoshida has reported a vulnerability in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Windows Kernel Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 18 of 40 in 2006. 16,688 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21415
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows Two Vulnerabilities
Vendor Patch. Secunia Advisory 19 of 40 in 2006. 17,828 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21417
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Management Console Cross-Site Scripting
Vendor Patch. Secunia Advisory 20 of 40 in 2006. 15,200 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21401
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Windows DNS Resolution Code Execution Vulnerabilities
Vendor Patch. Secunia Advisory 21 of 40 in 2006. 21,973 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21394
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Windows Server Service Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 22 of 40 in 2006. 24,985 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21388
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Microsoft Windows WMF File Handling Denial of Service
Unpatched. Secunia Advisory 23 of 40 in 2006. 18,344 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21377
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
cyanid-E has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Server Service DoS and Privilege Escalation
Vendor Patch. Secunia Advisory 24 of 40 in 2006. 23,562 views.
Release Date:
2006-07-31
Secunia Advisory ID:
SA21276
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Server Service Two Vulnerabilities
Vendor Patch. Secunia Advisory 25 of 40 in 2006. 20,971 views.
Release Date:
2006-07-11
Secunia Advisory ID:
SA21007
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Exposure of system information
System access
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to expose sensitive information and compromise a vulnerable system. [Read More]


patched Windows DHCP Client Service Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 26 of 40 in 2006. 20,167 views.
Release Date:
2006-07-11
Secunia Advisory ID:
SA21010
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Cybsec Security Systems has reported a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Windows HTML Help ActiveX Control Memory Corruption
Vendor Patch. Secunia Advisory 27 of 40 in 2006. 34,070 views.
Release Date:
2006-07-04
Secunia Advisory ID:
SA20906
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Internet Explorer Information Disclosure and HTA Application Execution
Vendor Patch. Secunia Advisory 28 of 40 in 2006. 37,541 views.
Release Date:
2006-06-27
Secunia Advisory ID:
SA20825
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Plebo Aesdi Nael has discovered two vulnerabilities in Microsoft Windows, which can be exploited by malicious people to disclose potentially sensitive information and potentially compromise a user's system. [Read More]


patched Microsoft Windows Hyperlink Object Library Vulnerabilities
Vendor Patch. Secunia Advisory 29 of 40 in 2006. 49,995 views.
Release Date:
2006-06-20
Secunia Advisory ID:
SA20748
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows TCP/IP Protocol Driver Buffer Overflow
Vendor Patch. Secunia Advisory 30 of 40 in 2006. 31,111 views.
Release Date:
2006-06-13
Secunia Advisory ID:
SA20639
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Microsoft Windows ART Image Handling Buffer Overflow
Vendor Patch. Secunia Advisory 31 of 40 in 2006. 18,053 views.
Release Date:
2006-06-13
Secunia Advisory ID:
SA20605
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows RPC Mutual Authentication Vulnerability
Vendor Patch. Secunia Advisory 32 of 40 in 2006. 15,270 views.
Release Date:
2006-06-13
Secunia Advisory ID:
SA20637
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to spoof a valid RPC server. [Read More]


patched Windows SMB Denial of Service and Privilege Escalation
Vendor Patch. Secunia Advisory 33 of 40 in 2006. 16,084 views.
Release Date:
2006-06-13
Secunia Advisory ID:
SA20635
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Ruben Santamarta has reported two vulnerabilities in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


patched Microsoft Windows Routing and Remote Access Vulnerabilities
Vendor Patch. Secunia Advisory 34 of 40 in 2006. 23,814 views.
Release Date:
2006-06-13
Secunia Advisory ID:
SA20630
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people or users to compromise a vulnerable system. [Read More]


patched Microsoft JScript Memory Corruption Vulnerability
Vendor Patch. Secunia Advisory 35 of 40 in 2006. 17,678 views.
Release Date:
2006-06-13
Secunia Advisory ID:
SA20620
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


unpatched Microsoft Windows "itss.dll" Heap Corruption Vulnerability
Unpatched. Secunia Advisory 36 of 40 in 2006. 22,409 views.
Release Date:
2006-05-10
Secunia Advisory ID:
SA20061
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Rubén Santamarta has discovered a vulnerability in Microsoft Windows, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Distributed Transaction Coordinator Two Vulnerabilities
Vendor Patch. Secunia Advisory 37 of 40 in 2006. 41,637 views.
Release Date:
2006-05-09
Secunia Advisory ID:
SA20000
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Microsoft Windows Explorer COM Object Handling Vulnerability
Vendor Patch. Secunia Advisory 38 of 40 in 2006. 21,896 views.
Release Date:
2006-04-11
Secunia Advisory ID:
SA19606
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Windows Media Player Plug-in EMBED Element Buffer Overflow
Vendor Patch. Secunia Advisory 39 of 40 in 2006. 30,474 views.
Release Date:
2006-02-14
Secunia Advisory ID:
SA18852
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Windows Media Player plug-in, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Embedded Web Fonts Code Execution Vulnerability
Vendor Patch. Secunia Advisory 40 of 40 in 2006. 22,656 views.
Release Date:
2006-01-10
Secunia Advisory ID:
SA18365
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows WMF "SETABORTPROC" Arbitrary Code Execution
Vendor Patch. Secunia Advisory 1 of 36 in 2005. 183,084 views.
Release Date:
2005-12-28
Secunia Advisory ID:
SA18255
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Kernel APC Queue List Handling Privilege Escalation
Vendor Patch. Secunia Advisory 2 of 36 in 2005. 17,900 views.
Release Date:
2005-12-13
Secunia Advisory ID:
SA15821
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


unpatched Microsoft Windows UPnP GetDeviceList Denial of Service
Unpatched. Secunia Advisory 3 of 36 in 2005. 23,976 views.
Release Date:
2005-11-17
Secunia Advisory ID:
SA17595
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Winny Thomas has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows WMF/EMF File Rendering Arbitrary Code Execution
Vendor Patch. Secunia Advisory 4 of 36 in 2005. 34,469 views.
Release Date:
2005-11-08
Secunia Advisory ID:
SA17498
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Plug-and-Play Service Buffer Overflows
Vendor Patch. Secunia Advisory 5 of 36 in 2005. 19,481 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17166
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
System access
Where:
From local network
Short Description:
eEye Digital Security has reported some vulnerabilities in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges, or by malicious users to compromise a vulnerable system. [Read More]


patched Microsoft Windows Shell and Web View Three Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 36 in 2005. 18,898 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17168
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Three vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows DirectShow AVI Handling Vulnerability
Vendor Patch. Secunia Advisory 7 of 36 in 2005. 25,363 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17160
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
eEye Digital Security has been reported a vulnerability in Microsoft Windows DirectShow, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Collaboration Data Objects Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 8 of 36 in 2005. 20,885 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17167
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Gary O'leary-Steele has reported a vulnerability in Microsoft Windows and Microsoft Exchange 2000 Server, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows MSDTC and COM+ Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 36 in 2005. 30,285 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17161
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
DoS
System access
Where:
From local network
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges, or by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Microsoft Windows Client Service for NetWare Buffer Overflow
Vendor Patch. Secunia Advisory 10 of 36 in 2005. 19,556 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17165
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious users, or by malicious people to compromise a vulnerable system. [Read More]


unpatched Windows Registry Editor Utility String Concealment Weakness
Unpatched. Secunia Advisory 11 of 36 in 2005. 83,233 views.
Release Date:
2005-08-24
Secunia Advisory ID:
SA16560
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
Spoofing
Where:
Local system
Short Description:
Igor Franchuk has discovered a weakness in Microsoft Windows, which can be exploited to hide certain information. [Read More]


patched Microsoft Windows COM Object Instantiation Memory Corruption Vulnerability
Vendor Patch. Secunia Advisory 12 of 36 in 2005. 69,913 views.
Release Date:
2005-08-18
Secunia Advisory ID:
SA16480
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Internet Explorer, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Plug-and-Play Service Buffer Overflow
Vendor Patch. Secunia Advisory 13 of 36 in 2005. 32,541 views.
Release Date:
2005-08-09
Secunia Advisory ID:
SA16372
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
System access
Where:
From local network
Short Description:
ISS X-Force has reported a vulnerability in Microsoft Windows, which can be exploited by malicious users to gain escalated privileges or by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Two Kerberos Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 36 in 2005. 17,135 views.
Release Date:
2005-08-09
Secunia Advisory ID:
SA16368
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Spoofing
Exposure of sensitive information
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious users to cause a DoS (Denial of Service), reveal sensitive information, or impersonate other users. [Read More]


patched Microsoft Windows Telephony Service Vulnerability
Vendor Patch. Secunia Advisory 15 of 36 in 2005. 20,713 views.
Release Date:
2005-08-09
Secunia Advisory ID:
SA16354
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Privilege escalation
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a vulnerable system. [Read More]


unpatched Microsoft Windows Unspecified USB Device Driver Vulnerability
Unpatched. Secunia Advisory 16 of 36 in 2005. 40,909 views.
Release Date:
2005-07-27
Secunia Advisory ID:
SA16210
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
System access
Where:
Local system
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people with physical access to a vulnerable system to compromise it. [Read More]


patched Windows Remote Desktop Protocol Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 17 of 36 in 2005. 45,024 views.
Release Date:
2005-07-14
Secunia Advisory ID:
SA16071
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Tom Ferris has reported a vulnerability in Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Network Connections Service Denial of Service
Vendor Patch. Secunia Advisory 18 of 36 in 2005. 28,853 views.
Release Date:
2005-07-14
Secunia Advisory ID:
SA16065
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
bkbll has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Color Management Module Buffer Overflow
Vendor Patch. Secunia Advisory 19 of 36 in 2005. 34,226 views.
Release Date:
2005-07-12
Secunia Advisory ID:
SA16004
Solution Status:
Vendor Patch
Criticality:
Extremely critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows HTML Help Input Validation Vulnerability
Vendor Patch. Secunia Advisory 20 of 36 in 2005. 21,645 views.
Release Date:
2005-06-14
Secunia Advisory ID:
SA15683
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Internet Explorer Two Vulnerabilities
Vendor Patch. Secunia Advisory 21 of 36 in 2005. 26,084 views.
Release Date:
2005-06-14
Secunia Advisory ID:
SA15606
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to disclose sensitive information and compromise a users system. [Read More]


patched Microsoft Windows Step-by-Step Interactive Training Vulnerability
Vendor Patch. Secunia Advisory 22 of 36 in 2005. 19,425 views.
Release Date:
2005-06-14
Secunia Advisory ID:
SA15669
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
iDEFENSE Labs has reported a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Server Message Block Vulnerability
Vendor Patch. Secunia Advisory 23 of 36 in 2005. 22,316 views.
Release Date:
2005-06-14
Secunia Advisory ID:
SA15694
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Agent Trusted Internet Content Spoofing Vulnerability
Vendor Patch. Secunia Advisory 24 of 36 in 2005. 17,903 views.
Release Date:
2005-06-14
Secunia Advisory ID:
SA15689
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to spoof certain information and potentially trick a user into installing a malicious program. [Read More]


patched Microsoft Windows Explorer Web View Script Insertion Vulnerability
Vendor Patch. Secunia Advisory 25 of 36 in 2005. 30,632 views.
Release Date:
2005-04-20
Secunia Advisory ID:
SA15017
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
GreyMagic has discovered a vulnerability in Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 26 of 36 in 2005. 18,308 views.
Release Date:
2005-04-12
Secunia Advisory ID:
SA14927
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


patched Microsoft Windows Shell MSHTA Script Execution Vulnerability
Vendor Patch. Secunia Advisory 27 of 36 in 2005. 23,015 views.
Release Date:
2005-04-12
Secunia Advisory ID:
SA14909
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Message Queuing Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 28 of 36 in 2005. 127,070 views.
Release Date:
2005-04-12
Secunia Advisory ID:
SA14921
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Kostya Kortchinsky has reported a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows EMF File Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 29 of 36 in 2005. 24,126 views.
Release Date:
2005-03-18
Secunia Advisory ID:
SA14631
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Hongzhen Zhou has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows TCP/IP Implementation Vulnerabilities
Vendor Patch. Secunia Advisory 30 of 36 in 2005. 35,739 views.
Release Date:
2005-03-07
Secunia Advisory ID:
SA14512
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Microsoft Windows OLE / COM Two Vulnerabilities
Vendor Patch. Secunia Advisory 31 of 36 in 2005. 17,948 views.
Release Date:
2005-02-08
Secunia Advisory ID:
SA14193
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Cesar Cerrudo has reported two vulnerabilities in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Hyperlink Object Library Buffer Overflow
Vendor Patch. Secunia Advisory 32 of 36 in 2005. 19,038 views.
Release Date:
2005-02-08
Secunia Advisory ID:
SA14195
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Anna Hollingzworth has reported a vulnerability in Microsoft Windows, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Drag and Drop Vulnerability
Vendor Patch. Secunia Advisory 33 of 36 in 2005. 21,923 views.
Release Date:
2005-02-08
Secunia Advisory ID:
SA14190
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Windows Anonymous Named Pipe Connection Information Disclosure
Vendor Patch. Secunia Advisory 34 of 36 in 2005. 22,268 views.
Release Date:
2005-02-08
Secunia Advisory ID:
SA14189
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Exposure of system information
Where:
From local network
Short Description:
Jean-Baptiste Marchand has reported a weakness in Microsoft Windows 2000 and XP, which can be exploited by malicious people to gain knowledge of certain system information. [Read More]


patched Microsoft Windows SMB Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 35 of 36 in 2005. 22,272 views.
Release Date:
2005-02-08
Secunia Advisory ID:
SA11634
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
eEye Digital Security has reported a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Windows Registry Key Locking Denial of Service
Unpatched. Secunia Advisory 36 of 36 in 2005. 25,095 views.
Release Date:
2005-01-31
Secunia Advisory ID:
SA14061
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
Local system
Short Description:
Vladimir Kraljevic has reported a security issue in Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


partial Microsoft Windows Multiple Vulnerabilities
Partial Fix. Secunia Advisory 1 of 24 in 2004. 56,482 views.
Release Date:
2004-12-25
Secunia Advisory ID:
SA13645
Solution Status:
Partial Fix
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Flashsky has reported some vulnerabilities in Microsoft Windows, allowing malicious people to compromise a vulnerable system or cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Kernel and LSASS Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 24 in 2004. 21,335 views.
Release Date:
2004-12-14
Secunia Advisory ID:
SA13465
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Cesar Cerrudo has reported two vulnerabilities in Microsoft Windows, allowing malicious, local users to escalate their privileges. [Read More]


patched Microsoft Word for Windows Converter Buffer Overflow Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 24 in 2004. 21,939 views.
Release Date:
2004-12-14
Secunia Advisory ID:
SA13462
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows HyperTerminal Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 4 of 24 in 2004. 20,935 views.
Release Date:
2004-12-14
Secunia Advisory ID:
SA13464
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Brett Moore has reported a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows Shell and Program Group Converter Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 24 in 2004. 21,276 views.
Release Date:
2004-10-13
Secunia Advisory ID:
SA12808
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows WebDAV XML Message Handler Denial of Service
Vendor Patch. Secunia Advisory 6 of 24 in 2004. 21,185 views.
Release Date:
2004-10-12
Secunia Advisory ID:
SA12801
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Amit Klein has reported a vulnerability in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 7 of 24 in 2004. 23,976 views.
Release Date:
2004-10-12
Secunia Advisory ID:
SA12804
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited to cause a DoS (Denial of Service), gain escalated privileges, or compromise a vulnerable system. [Read More]


patched Microsoft Windows NetDDE Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 8 of 24 in 2004. 20,498 views.
Release Date:
2004-10-12
Secunia Advisory ID:
SA12803
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
John Heasman has reported a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Windows Packet Fragmentation Handling Denial of Service Vulnerability
Unpatched. Secunia Advisory 9 of 24 in 2004. 20,181 views.
Release Date:
2004-10-01
Secunia Advisory ID:
SA12670
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Gandalf The White has reported a variant of some known vulnerabilities in Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows showHelp and HTML Help Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 24 in 2004. 19,881 views.
Release Date:
2004-07-13
Secunia Advisory ID:
SA12059
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Microsoft has issued an update for Windows. This fixes two vulnerabilities, allowing malicious websites to compromise a vulnerable system. [Read More]


patched Microsoft Windows POSIX Subsystem Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 11 of 24 in 2004. 16,254 views.
Release Date:
2004-07-13
Secunia Advisory ID:
SA12062
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Rafal Wojtczuk has reported a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows / Internet Explorer File Download Extension Spoofing
Vendor Patch. Secunia Advisory 12 of 24 in 2004. 21,332 views.
Release Date:
2004-07-13
Secunia Advisory ID:
SA12058
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Microsoft has issued an update for Microsoft Windows. This fixes a vulnerability, allowing malicious web sites to spoof the extension of files being downloaded. [Read More]


patched Microsoft Windows 2000 Utility Manager Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 13 of 24 in 2004. 15,505 views.
Release Date:
2004-07-13
Secunia Advisory ID:
SA12051
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Cesar Cerrudo has discovered a vulnerability in Microsoft Windows 2000, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Microsoft Windows Task Scheduler Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 14 of 24 in 2004. 21,388 views.
Release Date:
2004-07-13
Secunia Advisory ID:
SA12060
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Microsoft has issued an update for Windows. This fixes a vulnerability, allowing malicious websites to execute arbitrary code on a vulnerable system. [Read More]


unpatched Microsoft Java Virtual Machine Cross-Site Communication Vulnerability
Unpatched. Secunia Advisory 15 of 24 in 2004. 23,175 views.
Release Date:
2004-07-12
Secunia Advisory ID:
SA12047
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Marc Schoenefeld has reported a vulnerability in Microsoft Java Virtual Machine, allowing Java applets originating from different domains to communicate. [Read More]


patched Microsoft DirectPlay Packet Validation Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 16 of 24 in 2004. 19,056 views.
Release Date:
2004-06-08
Secunia Advisory ID:
SA11802
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
John Lampe has discovered a vulnerability in Microsoft DirectPlay, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Windows 2000 Expired Password Domain Authentication Security Issue
Vendor Patch. Secunia Advisory 17 of 24 in 2004. 18,907 views.
Release Date:
2004-06-01
Secunia Advisory ID:
SA11746
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From local network
Short Description:
A security issue has been discovered in Windows 2000, which may allow bypassing certain security restrictions. [Read More]


patched Microsoft Windows "desktop.ini" Arbitrary File Execution Vulnerability
Vendor Patch. Secunia Advisory 18 of 24 in 2004. 46,929 views.
Release Date:
2004-05-18
Secunia Advisory ID:
SA11633
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Roozbeh Afrasiabi has reported a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


patched Windows Explorer / Internet Explorer Long Share Name Buffer Overflow
Vendor Patch. Secunia Advisory 19 of 24 in 2004. 83,389 views.
Release Date:
2004-04-26
Secunia Advisory ID:
SA11482
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From local network
Short Description:
Rodrigo Gutierrez has discovered a vulnerability in Windows and Internet Explorer, which can be exploited by malicious people to compromise a user's system. [Read More]


patched Microsoft Windows RPC/DCOM Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 20 of 24 in 2004. 22,117 views.
Release Date:
2004-04-13
Secunia Advisory ID:
SA11065
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Microsoft has issued an advisory regarding multiple vulnerabilities in RPC/DCOM, where the most serious can potentially lead to a system compromise. [Read More]


patched Microsoft Windows 14 Vulnerabilities
Vendor Patch. Secunia Advisory 21 of 24 in 2004. 46,703 views.
Release Date:
2004-04-13
Secunia Advisory ID:
SA11064
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Microsoft has acknowledged 14 vulnerabilities in the Windows operating system, where the most serious can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Jet Database Engine Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 22 of 24 in 2004. 18,746 views.
Release Date:
2004-04-13
Secunia Advisory ID:
SA11068
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Matt Thompson has discovered a vulnerability in Microsoft Jet Database Engine, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows ASN.1 Library Integer Overflow Vulnerabilities
Vendor Patch. Secunia Advisory 23 of 24 in 2004. 35,516 views.
Release Date:
2004-02-10
Secunia Advisory ID:
SA10759
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
eEye Digital Security has discovered some vulnerabilities in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Data Access Components Broadcast Reply Buffer Overflow
Vendor Patch. Secunia Advisory 24 of 24 in 2004. 19,901 views.
Release Date:
2004-01-13
Secunia Advisory ID:
SA10616
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Microsoft has reported a vulnerability in MDAC (Microsoft Data Access Components), which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Microsoft Windows Workstation Service Buffer Overflow
Vendor Patch. Secunia Advisory 1 of 29 in 2003. 20,142 views.
Release Date:
2003-11-11
Secunia Advisory ID:
SA10193
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From local network
Short Description:
Microsoft has issued patches for Windows 2000 and XP. These fix a vulnerability in the Workstation service, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Microsoft HTML Help Control Privilege Escalation Vulnerability
Unpatched. Secunia Advisory 2 of 29 in 2003. 24,094 views.
Release Date:
2003-10-27
Secunia Advisory ID:
SA10066
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Microsoft HTML Help, which can be exploited by malicious, local users to escalate their privileges. [Read More]


patched Microsoft Windows Buffer Overflow in Messenger Service
Vendor Patch. Secunia Advisory 3 of 29 in 2003. 25,859 views.
Release Date:
2003-10-15
Secunia Advisory ID:
SA10012
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Microsoft has issued patches for Microsoft Windows to fix a buffer overflow vulnerability in Messenger Service, which could lead to execution of arbitrary code. [Read More]


patched Microsoft Windows 2000 Buffer Overflow in Windows Troubleshooter ActiveX Control
Vendor Patch. Secunia Advisory 4 of 29 in 2003. 14,692 views.
Release Date:
2003-10-15
Secunia Advisory ID:
SA10011
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Microsoft has issued patches to fix a vulnerability in the Windows Trouble Shooter ActiveX Control. This can be exploited by malicious HTML documents like web sites and emails to compromise a user's system. [Read More]


patched Microsoft Windows May Allow Installation of Arbitrary ActiveX Controls
Vendor Patch. Secunia Advisory 5 of 29 in 2003. 19,751 views.
Release Date:
2003-10-15
Secunia Advisory ID:
SA10010
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Microsoft has issued patches to fix a vulnerability in Microsoft Windows (Internet Explorer) allowing malicious HTML documents like web pages or emails to install arbitrary ActiveX controls. [Read More]


patched Windows RPC Race Condition Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 6 of 29 in 2003. 23,139 views.
Release Date:
2003-10-15
Secunia Advisory ID:
SA9978
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
ISS X-Force has reported a vulnerability in some versions of Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows Buffer Overflow in ListBox and ComboBox Control
Vendor Patch. Secunia Advisory 7 of 29 in 2003. 17,092 views.
Release Date:
2003-10-15
Secunia Advisory ID:
SA10014
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Microsoft has issued patches to fix a vulnerability in Microsoft Windows allowing malicious users to escalate their privileges. [Read More]


patched Microsoft Windows Help and Support Center Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 8 of 29 in 2003. 19,446 views.
Release Date:
2003-10-15
Secunia Advisory ID:
SA10013
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Microsoft has issued patches for Microsoft Windows to fix a vulnerability in the Help and Support Center. [Read More]


patched Windows Message Queuing Service Heap Overflow Vulnerability
Vendor Patch. Secunia Advisory 9 of 29 in 2003. 17,315 views.
Release Date:
2003-10-11
Secunia Advisory ID:
SA9991
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Windows 2000, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Microsoft Windows Unauthorised Thread Termination
Unpatched. Secunia Advisory 10 of 29 in 2003. 21,470 views.
Release Date:
2003-10-03
Secunia Advisory ID:
SA9921
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Windows, which can be exploited by malicious, local users to terminate certain privileged programs. [Read More]


unpatched Microsoft Windows TCP Packet Information Disclosure
Unpatched. Secunia Advisory 11 of 29 in 2003. 19,760 views.
Release Date:
2003-09-22
Secunia Advisory ID:
SA9799
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
A vulnerability has been identified in the handling of TCP packets in Microsoft Windows 2000 and Windows XP, which potentially can expose sensitive information. [Read More]


patched Microsoft Windows RPCSS Service DCOM Interface Vulnerabilities
Vendor Patch. Secunia Advisory 12 of 29 in 2003. 37,969 views.
Release Date:
2003-09-10
Secunia Advisory ID:
SA9692
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Three vulnerabilities have been identified in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system or cause a DoS (Denial of Service). [Read More]


patched Microsoft Windows NetBIOS Random Memory Content Disclosure
Vendor Patch. Secunia Advisory 13 of 29 in 2003. 16,017 views.
Release Date:
2003-09-03
Secunia Advisory ID:
SA9665
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
A vulnerability has been discovered in all supported Windows versions except Windows ME, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


patched Microsoft MDAC Buffer Overflow
Vendor Patch. Secunia Advisory 14 of 29 in 2003. 17,055 views.
Release Date:
2003-08-20
Secunia Advisory ID:
SA9579
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Microsoft has issued a patch for MDAC due to a vulnerability which allows malicious people to cause a buffer overflow. [Read More]


patched Microsoft Windows DirectX Remotely Exploitable Buffer Overflow
Vendor Patch. Secunia Advisory 15 of 29 in 2003. 26,246 views.
Release Date:
2003-07-23
Secunia Advisory ID:
SA9335
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been identified in DirectX allowing malicious people to gain system access. [Read More]


patched Windows RPC DCOM Interface Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 16 of 29 in 2003. 25,540 views.
Release Date:
2003-07-16
Secunia Advisory ID:
SA9287
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Windows SMB Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 17 of 29 in 2003. 17,083 views.
Release Date:
2003-07-09
Secunia Advisory ID:
SA9225
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Manipulation of data
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in some versions of Windows, which can be exploited by malicious users to cause a DoS (Denial of Service) on a vulnerable system and potentially compromise it. [Read More]


patched Windows 2000 Utility Manager Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 18 of 29 in 2003. 12,024 views.
Release Date:
2003-07-09
Secunia Advisory ID:
SA9224
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been identified in Windows 2000, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Windows 2000 ShellExecute API Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 19 of 29 in 2003. 13,758 views.
Release Date:
2003-07-03
Secunia Advisory ID:
SA9175
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Windows 2000, which can be exploited by malicious people to crash applications and potentially compromise a vulnerable system. [Read More]


patched Windows NetMeeting Directory Traversal Vulnerability
Vendor Patch. Secunia Advisory 20 of 29 in 2003. 18,159 views.
Release Date:
2003-07-02
Secunia Advisory ID:
SA9170
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been identified in Windows NetMeeting, which can be exploited by malicious people to overwrite arbitrary files on a user's system with the privileges of the user. [Read More]


patched Microsoft Windows HTML Converter Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 21 of 29 in 2003. 18,680 views.
Release Date:
2003-06-25
Secunia Advisory ID:
SA9113
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been identified in all supported Windows versions, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Windows NTFS File System Information Disclosure
Unpatched. Secunia Advisory 22 of 29 in 2003. 21,002 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8635
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
Matthew Murphy has reported a security issue in Windows, which potentially can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


patched Windows Kernel Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 23 of 29 in 2003. 12,709 views.
Release Date:
2003-04-16
Secunia Advisory ID:
SA8609
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been identified in some versions of Windows, which can be exploited by malicious users on a vulnerable system to escalate their privileges. [Read More]


patched Microsoft Virtual Machine Bytecode Verifier Vulnerability
Vendor Patch. Secunia Advisory 24 of 29 in 2003. 19,784 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8559
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability identified in Microsoft VM (Virtual Machine) shipped with almost all versions of Windows (except some versions of Windows XP) can be exploited by malicious people to compromise a user's system. [Read More]


patched Windows Script Engine Heap Overflow
Vendor Patch. Secunia Advisory 25 of 29 in 2003. 12,706 views.
Release Date:
2003-03-19
Secunia Advisory ID:
SA8346
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability identified in all currently supported versions of Microsoft Windows can be exploited by malicious people to compromise a user's system. [Read More]


unpatched Windows 2000/XP PostMessage Password Disclosure
Unpatched. Secunia Advisory 26 of 29 in 2003. 16,860 views.
Release Date:
2003-03-18
Secunia Advisory ID:
SA8329
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
An information disclosure vulnerability has been identified in Windows 2000 and Windows XP, which can be exploited by a malicious, local user to gain knowledge of sensitive information. [Read More]


unpatched Windows buffer overflow in riched20.dll
Unpatched. Secunia Advisory 27 of 29 in 2003. 15,094 views.
Release Date:
2003-02-20
Secunia Advisory ID:
SA8099
Solution Status:
Unpatched
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability in Windows can be exploited by malicious people to crash certain applications on a user's system. [Read More]


patched Microsoft Windows buffer overflow in Locator Service
Vendor Patch. Secunia Advisory 28 of 29 in 2003. 12,094 views.
Release Date:
2003-01-23
Secunia Advisory ID:
SA7926
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
System access
Where:
From remote
Short Description:
Microsoft has issued a security bulletin regarding a buffer overflow in the Locator Service. The Locater service only runs by default on Windows NT and 2000 domain controllers. [Read More]


unpatched Microsoft Windows crashes on invalid font file
Unpatched. Secunia Advisory 29 of 29 in 2003. 16,333 views.
Release Date:
2003-01-07
Secunia Advisory ID:
SA7824
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
Local system
Short Description:
Microsoft Windows 2000 and XP does not handle fonts correctly. Malformed font files can bring the system to an immediate reboot if viewed in the font viewer (fontview). [Read More]


unpatched Microsoft Windows Certificate Chain vulnerability
Unpatched. Secunia Advisory 1 of 16 in 2002. 22,313 views.
Release Date:
2002-12-30
Secunia Advisory ID:
SA7793
Solution Status:
Unpatched
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
Microsoft Windows is flawed in the way it trusts certificates. Microsoft Windows File Protection will automatically trust software that has been digitally signed with certificates rooted in any of the Trusted Root Certification Authorities. [Read More]


patched Microsoft Windows SMB signing bypass
Vendor Patch. Secunia Advisory 2 of 16 in 2002. 13,090 views.
Release Date:
2002-12-12
Secunia Advisory ID:
SA7689
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Exposure of sensitive information
Privilege escalation
Where:
From local network
Short Description:
Microsoft Windows 2000 and XP supports digital signing of SMB traffic. However it is possible for malicious persons to downgrade / turn off signing even if the network adminstrator has required this. [Read More]


partial Microsoft Windows Window Messaging Privilege Escalation Vulnerability
Partial Fix. Secunia Advisory 3 of 16 in 2002. 14,091 views.
Release Date:
2002-12-12
Secunia Advisory ID:
SA7688
Solution Status:
Partial Fix
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been identified in Microsoft Windows, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


patched Microsoft Windows Virtual Machine multiple vulnerabilities
Vendor Patch. Secunia Advisory 4 of 16 in 2002. 13,218 views.
Release Date:
2002-12-12
Secunia Advisory ID:
SA7687
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Microsoft has issued a new build of their virtual machine, it fixes a number of issues, some which previously has been published by Secunia. [Read More]


patched Microsoft vulnerabilities in Internet Explorer, Outlook, Outlook Express and Internet Information Server (IIS)
Vendor Patch. Secunia Advisory 5 of 16 in 2002. 24,108 views.
Release Date:
2002-11-20
Secunia Advisory ID:
SA7567
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Remote Data Services (RDS) which is part of Microsoft Data Access Components (MDAC) contains a buffer overflow allowing attackers to run arbitrary code. [Read More]


unpatched Microsoft Windows 2000 insecure permissions
Unpatched. Secunia Advisory 6 of 16 in 2002. 10,944 views.
Release Date:
2002-10-31
Secunia Advisory ID:
SA7421
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
Privilege escalation
Where:
Local system
Short Description:
Windows 2000 provides everyone full acccess to the system root (usually c:\), this could be abused to lauch trojan horse applications against other local users. [Read More]


patched Microsoft PPTP Implementation Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 7 of 16 in 2002. 12,361 views.
Release Date:
2002-10-31
Secunia Advisory ID:
SA7420
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Windows 2000 pre SP3 SNMP DoS issue
Vendor Patch. Secunia Advisory 8 of 16 in 2002. 9,117 views.
Release Date:
2002-10-22
Secunia Advisory ID:
SA7366
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
DoS
Where:
From remote
Short Description:
Microsoft Windows 2000 which does not have Service Pack 3 installed are vulnerable to a Denial of Service attack. [Read More]


patched Microsoft Windows RPC Endpoint Mapper Denial of Service
Vendor Patch. Secunia Advisory 9 of 16 in 2002. 14,311 views.
Release Date:
2002-10-19
Secunia Advisory ID:
SA7347
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been identified in Windows, which can be exploited by a malicious person to cause a DoS (Denial of Service) on some services on a vulnerable system. [Read More]


patched Microsoft Windows HTML Help facility buffer overflow
Vendor Patch. Secunia Advisory 10 of 16 in 2002. 8,233 views.
Release Date:
2002-10-03
Secunia Advisory ID:
SA7199
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
The HTML Help facility contains a number of vulnerabilities, which possibly could allow attackers to gain system access. [Read More]


patched Microsoft PPTP Client and Server Pre-Authentication Buffer Overflow
Vendor Patch. Secunia Advisory 11 of 16 in 2002. 8,942 views.
Release Date:
2002-09-26
Secunia Advisory ID:
SA7164
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


patched Microsoft issues patches to Virtual Machine vulnerabilities
Vendor Patch. Secunia Advisory 12 of 16 in 2002. 8,405 views.
Release Date:
2002-09-19
Secunia Advisory ID:
SA7129
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
System access
Where:
From remote
Short Description:
Microsoft has issued patches to three vulnerabilities in VM JDBC. [Read More]


patched Microsoft RDP / Terminal Services uses weak encryption - patches issued
Vendor Patch. Secunia Advisory 13 of 16 in 2002. 17,014 views.
Release Date:
2002-09-18
Secunia Advisory ID:
SA7118
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Microsoft Remote Dekstop Protocol uses weak encryption and bad security practise. [Read More]


partial Microsoft Windows 16-bit Application Execution Restriction Bypass
Partial Fix. Secunia Advisory 14 of 16 in 2002. 21,939 views.
Release Date:
2002-09-18
Secunia Advisory ID:
SA7127
Solution Status:
Partial Fix
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
Torbjörn Hovmark has reported a security issue in Windows, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


patched Microsoft: Certificate Validation Flaw Enables Identity Spoofing
Vendor Patch. Secunia Advisory 15 of 16 in 2002. 14,476 views.
Release Date:
2002-09-05
Secunia Advisory ID:
SA7072
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Spoofing
Where:
From remote
Short Description:
Microsoft admits that a critical flaw exists in its Crypto API which evaluates certificates. [Read More]


patched Microsoft Windows Filesharing Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 16 of 16 in 2002. 2,127 views.
Release Date:
2002-09-02
Secunia Advisory ID:
SA9
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
[Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Microsoft Windows 2000 Professional 
No posts yet

-

You must be logged in to post a comment.