cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_7:-:-:x32 cpe:/o:microsoft:windows_7:-:-:x64 cpe:/o:microsoft:windows_server_2008:::itanium cpe:/o:microsoft:windows_server_2008:::x32 cpe:/o:microsoft:windows_server_2008:::x64 cpe:/o:microsoft:windows_server_2008::r2:itanium cpe:/o:microsoft:windows_server_2008::r2:x64 cpe:/o:microsoft:windows_vista::sp1 cpe:/o:microsoft:windows_vista::sp1:x64 CVE-2010-1893 2010-08-11T14:47:50.093-04:00 2017-09-18T21:30:53.220-04:00 6.8 LOCAL LOW SINGLE_INSTANCE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2010-08-12T13:46:00.000-04:00 ALLOWS_ADMIN_ACCESS MS MS10-058 CERT TA10-222A Integer overflow in the TCP/IP stack in Microsoft Windows Vista SP1, Windows Server 2008 Gold and R2, and Windows 7 allows local users to gain privileges via a buffer of user-mode data that is copied to kernel mode, aka "Integer Overflow in Windows Networking Vulnerability."