Microsoft

Windows Nt

263 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.66%
  • Published 31.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in cmd.exe in Windows NT 4.0 may allow local users to execute arbitrary code via a long pathname argument to the cd command.

  • EPSS 6.65%
  • Published 17.11.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application.

  • EPSS 43.7%
  • Published 17.11.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

The Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers to execute arbitrary code without user appr...

  • EPSS 66.8%
  • Published 17.11.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL.

Exploit
  • EPSS 83.03%
  • Published 17.11.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.

  • EPSS 50.24%
  • Published 17.11.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

A multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one th...

  • EPSS 35.04%
  • Published 20.10.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information.

  • EPSS 65.84%
  • Published 17.09.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CV...

  • EPSS 65.84%
  • Published 17.09.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a d...

  • EPSS 4.45%
  • Published 27.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

The getCanonicalPath function in Windows NT 4.0 may free memory that it does not own and cause heap corruption, which allows attackers to cause a denial of service (crash) via requests that cause a long file name to be passed to getCanonicalPath, as ...