Microsoft

Windows 2003 Server

405 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.78%
  • Veröffentlicht 10.02.2011 16:00:13
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Kerberos in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 supports weak hashing algorithms, which allows local users to gain privileges by operating a service that sends crafted service tickets, as demonstrated by the CRC32 algorithm, aka "Ker...

  • EPSS 1.96%
  • Veröffentlicht 09.02.2011 01:00:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly process authentication requests, which allows local users to gain privileges via a request with a crafted length, aka "LS...

  • EPSS 40.23%
  • Veröffentlicht 09.02.2011 01:00:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The server in Microsoft Active Directory on Windows Server 2003 SP2 does not properly handle an update request for a service principal name (SPN), which allows remote attackers to cause a denial of service (authentication downgrade or outage) via a c...

  • EPSS 1.03%
  • Veröffentlicht 09.02.2011 01:00:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users t...

  • EPSS 0.63%
  • Veröffentlicht 09.02.2011 01:00:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted applicat...

  • EPSS 0.49%
  • Veröffentlicht 09.02.2011 01:00:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users t...

  • EPSS 0.76%
  • Veröffentlicht 09.02.2011 01:00:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users t...

  • EPSS 0.59%
  • Veröffentlicht 09.02.2011 01:00:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users t...

  • EPSS 0.24%
  • Veröffentlicht 09.02.2011 01:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly kill processes after a logout, which allows local users to obtain sensitive information or gain privileges via a crafted applicatio...

Exploit
  • EPSS 73.88%
  • Veröffentlicht 31.01.2011 20:00:49
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle a MIME format in a request for cont...