Microsoft

Windows Xp

739 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 80.79%
  • Published 05.03.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

Windows Server 2003 and XP SP2, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, aka a reoccurrence o...

  • EPSS 55.01%
  • Published 11.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

The Indexing Service for Microsoft Windows XP and Server 2003 does not properly validate the length of a message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.

  • EPSS 27.58%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious ...

  • EPSS 26.52%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability...

  • EPSS 0.93%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges,...

  • EPSS 1.6%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.

  • EPSS 30.19%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site,...

  • EPSS 18.52%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Internet Explorer on Windows XP does not properly modify the "Drag and Drop or copy and paste files" setting when the user sets it to "Disable" or "Prompt," which may enable security-sensitive operations that are inconsistent with the user's intended...

  • EPSS 70.18%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Internet Explorer 6.0 on Windows XP SP2 allows remote attackers to execute arbitrary code by using the "Related Topics" command in the Help ActiveX Control (hhctrl.ocx) to open a Help popup window containing the PCHealth tools.htm file in the local z...

Exploit
  • EPSS 54.19%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and I...