CVE-2005-0061
- EPSS 2.07%
- Published 02.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
The kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.
CVE-2005-0063
- EPSS 76.51%
- Published 02.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML App...
CVE-2005-0545
- EPSS 0.58%
- Published 02.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a...
CVE-2005-0550
- EPSS 1.09%
- Published 02.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to cause a denial of service (i.e., system crash) via a malformed request, aka "Object Management Vulnerability".
- EPSS 47.07%
- Published 02.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Stack-based buffer overflow in WINSRV.DLL in the Client Server Runtime System (CSRSS) process of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application that p...
CVE-2005-0904
- EPSS 1.01%
- Published 02.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Remote Desktop in Windows XP SP1 does not verify the "Force shutdown from a remote system" setting, which allows remote attackers to shut down the system by executing TSShutdn.exe.
- EPSS 24.35%
- Published 02.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Windows Explorer and Internet Explorer in Windows 2000 SP1 allows remote attackers to cause a denial of service (CPU consumption) via a malformed Windows Metafile (WMF) file.
- EPSS 76.74%
- Published 02.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep aliv...
CVE-2005-0416
- EPSS 59.92%
- Published 27.04.2005 04:00:00
- Last modified 03.04.2025 01:03:51
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allows remote attackers to execute arbitrary code via the AnimationHeaderBlock length field, which leads to a stack-based b...
- EPSS 86.96%
- Published 12.04.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have...