Microsoft

Windows Xp

739 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 35.04%
  • Published 20.10.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information.

  • EPSS 65.84%
  • Published 17.09.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CV...

  • EPSS 65.84%
  • Published 17.09.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a d...

  • EPSS 62.1%
  • Published 18.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.

Exploit
  • EPSS 90.17%
  • Published 18.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.

  • EPSS 81.95%
  • Published 07.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer...

  • EPSS 1.98%
  • Published 09.06.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in EXPLORER.EXE on Windows XP allows attackers to execute arbitrary code as the XP user via a desktop.ini file with a long .ShellClassInfo parameter.

  • EPSS 4.29%
  • Published 12.05.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.

Exploit
  • EPSS 66.11%
  • Published 02.04.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference...

  • EPSS 26.25%
  • Published 24.03.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Integer overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a lar...