Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-3944Improper Input Validation in Microsoft Windows Server 2008

Severity
7.2HIGHNVD
EPSS
1.0%
top 22.91%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 16
Latest updateMay 14

Description

win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability."

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

1
GHSA
GHSA-whc5-w7f7-2gw5: win32k2022-05-14

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows - Win32k Pointer Dereferencement (PoC) (MS10-098)2010-12-17

🕵️Threat Intelligence

1
Zscaler
Zscaler found Multiple Security Vulnerabilities | 12-14-2010