cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_7:-:-:x32 cpe:/o:microsoft:windows_7:-:-:x64 cpe:/o:microsoft:windows_server_2008:::itanium cpe:/o:microsoft:windows_server_2008:::x32 cpe:/o:microsoft:windows_server_2008:::x64 cpe:/o:microsoft:windows_server_2008::r2:itanium cpe:/o:microsoft:windows_server_2008::r2:x64 cpe:/o:microsoft:windows_server_2008::sp2:x32 cpe:/o:microsoft:windows_server_2008::sp2:x64 cpe:/o:microsoft:windows_server_2008:-::itanium cpe:/o:microsoft:windows_server_2008:-:sp2:itanium cpe:/o:microsoft:windows_vista::sp1 cpe:/o:microsoft:windows_vista::sp1:x64 cpe:/o:microsoft:windows_vista::sp2 cpe:/o:microsoft:windows_vista::sp2:x64 cpe:/o:microsoft:windows_vista:-:sp1 cpe:/o:microsoft:windows_vista:-:sp2 CVE-2010-1890 2010-08-11T14:47:50.047-04:00 2017-09-18T21:30:53.033-04:00 4.6 LOCAL LOW SINGLE_INSTANCE NONE NONE COMPLETE http://nvd.nist.gov 2010-08-12T13:21:00.000-04:00 MS MS10-047 The kernel in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate ACLs on kernel objects, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Improper Validation Vulnerability."