The Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted name for a (1) file or (2) directory, aka "Command Injection Vulnerability."
2012-07-10T21:55:05.027
2025-04-11T00:51:21.963
Deferred
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_2003_server | * | Yes |
Operating System | microsoft | windows_2003_server | * | Yes |
Operating System | microsoft | windows_7 | * | Yes |
Operating System | microsoft | windows_7 | - | Yes |
Operating System | microsoft | windows_7 | - | Yes |
Operating System | microsoft | windows_7 | - | Yes |
Operating System | microsoft | windows_server_2003 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | * | Yes |
Operating System | microsoft | windows_server_2008 | - | Yes |
Operating System | microsoft | windows_vista | * | Yes |
Operating System | microsoft | windows_xp | * | Yes |
Operating System | microsoft | windows_xp | - | Yes |