When obsolete software is detected on a scanned system, Qualys reports a high severity vulnerability. Software vendors either provide no patches for obsolete software, which clearly increases security risk over time. Or, software vendors provide private patches only to their customers with special support agreements, and Qualys does not have access to analyze private patches for vulnerabilities. It is therefore a best practice always to upgrade obsolete software as soon as possible.
To help demonstrate the risk of obsolete software, the Qualys Vulnerability Research Team periodically evaluates prevalent or important publicly available exploits against obsolete operating systems and software packages to determine if they are vulnerable. When an obsolete version is found to be vulnerable to an exploit, this information is integrated into the vulnerability detection to improve the accuracy and coverage of the detection. Findings from the Qualys Vulnerability Research Team are published below.
Oracle WebLogic Server, version(s) 10.3.6.0, 12.1.3.0, 12.2.1.0
https://github.com/CoalfireLabs/java_deserialization_exploits/blob/master/WebLogic/weblogic.py
Additional Vulnerable Software
Oracle WebLogic Server, version(s) 10.3.5.0
Impact of Exploit
Remote Code Execution
Windows 2003 - Windows 8.1
see advisory for full detail
Additional Vulnerable Software
Windows XP SP3
Impact of Exploit
Elevation of Privilege
Windows 2003 - Windows 8.1
see advisory for full detail
Additional Vulnerable Software
Windows XP SP3
Impact of Exploit
Local Privilege Escalation
Windows 2003 - Windows 8.1
see advisory for full detail
Additional Vulnerable Software
Windows XP SP3
Impact of Exploit
Elevation of Privilege
Windows 2003 - Windows 8.1
see advisory for full detail
Additional Vulnerable Software
Windows XP SP3 with IE7
Impact of Exploit
Remote Code Execution
Windows 2003 - Windows 8.1
see advisory for full detail
Additional Vulnerable Software
Windows XP SP3 with IE7
Impact of Exploit
Remote Code Execution
see advisory for full detail
Additional Vulnerable Software
Windows XP SP2 with IE7
Impact of Exploit
Remote Code Execution
Microsoft MS11-050 Exploit for Obsolete Windows XP SP
Windows XP SP3, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2,Windows Vista Service Pack 1 and Windows Vista Service Pack 2,Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2,Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*,Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2*,Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2,Windows 7 for 32-bit Systems,Windows 7 for x64-based Systems,Windows Server 2008 R2 for x64-based Systems*,Windows Server 2008 R2 for Itanium-based Systems
Additional Vulnerable Software Windows XP SP2
Windows XP SP1
2000 sp4
Windows Vista SP0
Windows XP SP0
windows 2003 enterprise 32bit sp1
Impact of Exploit Elevation of Privilege
Windows XP SP3, Windows XP Pro x64 SP2, Windows Server 2003 SP2, Windows Server 2003 x64 SP2
Additional Vulnerable Software Win 2000 RTM and all SP
Win XP SP0, SP1, SP2
Win XP x64 SP1
Win 2003 SP0, SP1
Win 2003 x64 SP0, SP1
Impact of Exploit Elevation of Privilege
Credit Diego Juarez of Core Security Technologies for reporting the OpenType Font Validation Vulnerability (CVE-2010-2741)
IE6 running in Windows XP SP3, Windows XP x64 SP2, Windows 2003 SP2, Windows 2003 x64 SP2, Windows 2003 SP2 for Itanium
IE7 running in Windows XP SP3, Windows XP x64 SP2, Windows 2003 SP2, Windows 2003 x64 SP2, Windows 2003 SP2 for Itanium, Windows Vista SP1-2, Windows Vista x64 SP1-2, Windows 2008 SP0-2, Windows 2008 x64 SP0-2, Windows 2001 SP0-2 for itanium
IE8 running in Windows XP SP3, Windows XP x64 SP2, Windows 2003 SP2, Windows 2003 x64 SP2, Windows Vista SP1-2, Windows Vista x64 SP1-2, Windows 2008 SP0-2, Windows 2008 x64 SP0-2, Windows 7, Windows 7 x64, Windows 2008 R2 x64, Windows 2008 R2 for itanium
Additional Vulnerable Software IE 6 running in XP SP2
IE 7 running in XP SP2
IE 8 running in XP SP2
Impact of Exploit Remote Code Execution
Credit: This vulnerability was discovered and researched by Rodrigo Rubira Branco from Check Point Vulnerability Discovery Team (VDT). For more information click here.
Windows XP SP3, Windows XP x64 SP2, Windows 2003 SP2, Windows 2003 x64 SP2, Windows VISTA SP1, Windows VISTA SP2
Metasploit 3.4.2dev "ms10_061_spoolss"
Additional Vulnerable Software Windows 2000
Windows XP SP1
Windows XP SP2
Windows XP x64 SP1
Impact of Exploit Remote Code Execution
Additional Vulnerable Software Windows 2003
Windows 2003 SP1
Windows 2003 x64
Windows 2003 x64 SP 1
Windows Vista
Impact of Exploit Elevation of Privilege
Windows XP SP 3, Vista SP1, Vista SP2, Vista 64 SP1, Vista 64 SP2, Windows Server 2008 for 32-bit Systems, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems, Windows Server 2008 for x64-based Systems Service Pack 2*, Windows Server 2008 for Itanium-based Systems, Windows Server 2008 for Itanium-based Systems Service Pack 2, Windows 7 for 32-bit Systems, Windows 7 for x64-based Systems, Windows Server 2008 R2 for x64-based Systems, Windows Server 2008 R2 for Itanium-based Systems
Additional Vulnerable Software Windows XP SP0
Windows XP SP1
Windows XP SP2
Windows 2000 32bit
Impact of Exploit Elevation of Privilege
Additional Vulnerable Software Windows Vista
Impact of Exploit Denial of service
Windows XP SP3/x64 SP2, 2003 SP2, Vista SP 1/2 , 2008 SP2, Windows 7
Additional Vulnerable Software Windows XP SP1
Windows XP SP2
Windows 2003
Windows 2003 SP1
Impact of Exploit Denial of Service
Windows XP Service Pack 3, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 1 and Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*, Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2*, Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2, Windows 7 for 32-bit Systems, Windows 7 for x64-based Systems, Windows Server 2008 R2 for x64-based Systems*, Windows Server 2008 R2 for Itanium-based Systems
Additional Vulnerable Software Windows XP SP2
Windows 2003
Impact of Exploit Denial of Service (BSOD)
Windows XP SP3, Windows XP 64 SP2
Additional Vulnerable Software Windows XP SP0
Windows XP SP1
Windows XP SP2
Windows XP 64
Windows XP 64 SP1
Impact of Exploit Local Privilege Escalation Vulnerability
Windows XP SP3,Windows XP x64 Edition SP2, Windows 2003 SP2, 2003 x64 SP2, Windows Vista SP1,SP2, Windows Server 2008,SP2, Windows 7, Windows Server 2008 R2
Additional Vulnerable Software Windows 2000 sp4
Windows XP x64 SP1
Windows XP SP2
Windows vista SP0
Impact of Exploit Denial of Service
Microsoft Office XP SP3, Microsoft Office 2003 SP3, 2007 Microsoft Office System SP1/2, Microsoft Office Excel Viewer SP1/2, Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Service Pack 1/2, Microsoft Office for Mac 2004/2008, Open XML File Format Converter for Mac
Publically available: http://www.packetstormsecurity.org/1007-exploits/msexcel0x5d-overflow.txt
Additional Vulnerable Software Microsoft Office System 2007 Service Pack 0
Impact of Exploit Remote Code Execution
Windows XP SP3, Windows XP Professional x64 Edition SP2, Windows Server 2003 SP2,Windows Server 2003 x64 Edition SP2,Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista SP1 and Windows Vista SP2,Windows Vista x64 Edition SP1 and Windows Vista x64 Edition SP2,Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems SP2,Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems SP2,Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems SP2,Windows 7 for 32-bit Systems,Windows 7 for x64-based Systems,Windows Server 2008 R2 for x64-based Systems,Windows Server 2008 R2 for Itanium-based Systems
ExploitDB #14403 "Microsoft Windows Automatic LNK Shortcut File Code Execution"
Additional Vulnerable Software Windows XP SP0/1/2 32bit
Windows 2003 SP1 32bit
Windows Vista SP0 32 bit
Impact of Exploit Remote Code Execution
Windows 2000 SP4 with IE6 SP1, Windows XP SP2/3 with IE6/7, Windows Server 2003 SP2 with IE6/7, Windows Vista SP0/1/2 with IE7, Windows 2008 SP0/2 with IE7
Metasploit 3.4.1dev "ms10_018_ie_behaviors" using "windows/exec" payload
Additional Vulnerable Software Windows XP SP0 with IE6
Windows XP SP1 with IE6
Windows 2003 SP1 with IE6
Impact of Exploit Remote Code Execution
Additional Vulnerable Software Windows 2003 SP1 with IE7
Impact of Exploit Denial of Service
Windows XP SP0 + IE6 Update Version 0
Windows 2003 SP1 + IE6 SP1
Windows 2000 SP4 with IE6 SP1, Windows XP SP2/3 with IE6, Windows Server 2003 SP2 with IE6
Metasploit 3.4.1dev "ms10_002_aurora" with payload "windows/exec"
Metasploit currently only has an exploit for IE6
Additional Vulnerable Software Windows 2000 SP1 with IE6
Windows XP SP0 with IE6
Windows XP SP1 with IE6
Impact of Exploit Remote Code Execution
Windows 2000 SP1 + IE SP1 and XP SP0/1 + IE SP0/1
Windows 2000 SP4 with IE6 SP1, Windows XP SP2/3 with IE6/7, Windows Server 2003 SP2 with IE6/7, Windows Vista SP0/1/2 with IE7, Windows 2008 SP0/2 with IE7
etasploit 3.4.1dev "ms09_072_style_object" with payload "windows/exec"
Additional Vulnerable Software Windows XP SP0 with IE6
Impact of Exploit Remote Code Execution
Additional Vulnerable Software Windows 2003 SP0 with IE6
Impact of Exploit Denial of Service
Microsoft MS09-072 Exploit for Obsolete Windows XP SP0 and 2003 SP0
Microsoft Office Excel 2002 SP3, Microsoft Office Excel 2003 SP3, Microsoft Office Excel 2007 SP1, Microsoft Office Excel 2007 SP2
Metasploit 3.4.1dev "ms09_067_excel_featheader" with payload "windows/exec"
Additional Vulnerable Software Office XP SP0
Office XP SP1
Office 2007 SP0
Impact of Exploit Denial of Service
Additional Vulnerable Software Office Excel 2003 SP0
Impact of Exploit Remote Code Execution
Microsoft Office XP SP3, Microsoft Office 2003 SP3, Microsoft Office 2000 Web Components SP3, Microsoft Office XP Web Components SP3, Microsoft Office 2003 Web Components SP1 for the 2007 Microsoft Office System
Metasploit 3.4.1dev "ms09_043_owc_msdso" with payload "windows/exec"
Metasploit currently only has an exploit for Office Web Components
Additional Vulnerable Software Office XP SP0
Impact of Exploit Denial of Service
Additional Vulnerable Software Office XP SP1
Windows 2003 SP1 with Office XP SP2
Impact of Exploit Remote Code Execution