Microsoft

Windows Xp

739 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.24%
  • Veröffentlicht 27.07.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in a certain USB driver, as used on Microsoft Windows, allows attackers to execute arbitrary code.

Exploit
  • EPSS 50.21%
  • Veröffentlicht 19.07.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

netman.dll in Microsoft Windows Connections Manager Library allows local users to cause a denial of service (Network Connections Service crash) via a large integer argument to a particular function, aka "Network Connection Manager Vulnerability."

  • EPSS 53.42%
  • Veröffentlicht 14.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability."

  • EPSS 1.27%
  • Veröffentlicht 14.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the Web Client service in Microsoft Windows XP and Windows Server 2003 allows remote authenticated users to execute arbitrary code via a crafted WebDAV request containing special parameters.

  • EPSS 42.85%
  • Veröffentlicht 14.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer ov...

  • EPSS 38.03%
  • Veröffentlicht 14.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.

  • EPSS 29.17%
  • Veröffentlicht 14.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Microsoft Agent allows remote attackers to spoof trusted Internet content and execute arbitrary code by disguising security prompts on a malicious Web page.

Exploit
  • EPSS 35.13%
  • Veröffentlicht 13.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Heap-based buffer overflow in the BERDecBitString function in Microsoft ASN.1 library (MSASN1.DLL) allows remote attackers to execute arbitrary code via nested constructed bit strings, which leads to a realloc of a non-null pointer and causes the fun...

  • EPSS 13.08%
  • Veröffentlicht 01.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Memory leak in Windows Management Instrumentation (WMI) service allows attackers to cause a denial of service (memory consumption and crash) by creating security contexts more quickly than they can be cleared from the RPC cache.

Exploit
  • EPSS 80.86%
  • Veröffentlicht 31.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes ...