{"uuid": "0f14276a-f39c-46c8-88f5-d6a5b867c441", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2010-2554", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2444", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2010-2554\n\ud83d\udd39 Description: The Tracing Feature for Services in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 has incorrect ACLs on its registry keys, which allows local users to gain privileges via vectors involving a named pipe and impersonation, aka \"Tracing Registry Key ACL Vulnerability.\"\n\ud83d\udccf Published: 2010-08-11T18:00:00\n\ud83d\udccf Modified: 2025-01-21T17:24:53.805Z\n\ud83d\udd17 References:\n1. https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12082\n2. https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-059", "creation_timestamp": "2025-01-21T18:01:01.000000Z"}