Microsoft

Windows Server 2003

456 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.28%
  • Veröffentlicht 21.01.2009 20:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Microsoft Windows does not properly enforce the Autorun and NoDriveTypeAutoRun registry values, which allows physically proximate attackers to execute arbitrary code by (1) inserting CD-ROM media, (2) inserting DVD media, (3) connecting a USB device,...

  • EPSS 73.95%
  • Veröffentlicht 14.01.2009 22:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in SMB in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via malformed values of unspecified "fields inside the SMB packets" in an NT Tra...

  • EPSS 66.73%
  • Veröffentlicht 14.01.2009 22:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

SMB in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via malformed values of unspecified "fields inside the SMB packets...

  • EPSS 68.72%
  • Veröffentlicht 10.12.2008 14:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in GDI in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via a malformed header in a crafted WMF file, which triggers a buffe...

  • EPSS 45.75%
  • Veröffentlicht 10.12.2008 14:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in an API in GDI in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows context-dependent attackers to cause a denial of service or execute arbitrary code via a WM...

Exploit
  • EPSS 0.78%
  • Veröffentlicht 12.11.2008 23:30:02
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Race condition in Microsoft Windows Server 2003 and Vista allows local users to cause a denial of service (crash or hang) via a multi-threaded application that makes many calls to UnhookWindowsHookEx while certain other desktop activity is occurring.

Exploit
  • EPSS 94.04%
  • Veröffentlicht 23.10.2008 22:00:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during p...

  • EPSS 0.48%
  • Veröffentlicht 20.10.2008 17:59:26
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vect...

  • EPSS 1.13%
  • Veröffentlicht 15.10.2008 00:12:16
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in Memory Manager in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that triggers an erroneous decrement of a variable, r...

  • EPSS 70.09%
  • Veröffentlicht 15.10.2008 00:12:16
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer underflow in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to execute arbitrary code via a Server Message Block (SMB) request that contains a filename with a cr...