Microsoft

Windows Nt

263 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 81.05%
  • Published 03.11.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or appl...

  • EPSS 3.2%
  • Published 03.11.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

"Shatter" style vulnerability in the Window Management application programming interface (API) for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to gain privileges by using certain API func...

  • EPSS 3.39%
  • Published 03.11.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a wa...

  • EPSS 21%
  • Published 03.11.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

The RPC Runtime Library for Microsoft Windows NT 4.0 allows remote attackers to read active memory or cause a denial of service (system crash) via a malicious message, possibly related to improper length values.

  • EPSS 86.07%
  • Published 03.11.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, poss...

  • EPSS 63.79%
  • Published 06.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Heap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vuln...

Warning
  • EPSS 5.64%
  • Published 06.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.

  • EPSS 85.02%
  • Published 06.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Interne...

  • EPSS 47.17%
  • Published 27.07.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Double free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image.

  • EPSS 88.41%
  • Published 01.06.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and...