Microsoft

Windows 2003 Server

405 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 21.56%
  • Published 10.04.2007 23:19:00
  • Last modified 09.04.2025 00:30:58

Heap-based buffer overflow in Microsoft Windows allows user-assisted remote attackers to have an unknown impact via a crafted .HLP file.

  • EPSS 65.75%
  • Published 10.04.2007 21:19:00
  • Last modified 09.04.2025 00:30:58

Unspecified vulnerability in Microsoft Agent (msagent\agentsvr.exe) in Windows 2000 SP4, XP SP2, and Server 2003, 2003 SP1, and 2003 SP2 allows remote attackers to execute arbitrary code via crafted URLs, which result in memory corruption.

  • EPSS 2.12%
  • Published 10.04.2007 21:19:00
  • Last modified 09.04.2025 00:30:58

The Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0; 2000 SP4; XP SP2; Server 2003, 2003 SP1, and 2003 SP2; and Windows Vista before June 2006; uses insecure permissions (PAGE_READWRITE) for a physical memory view, which a...

  • EPSS 75.74%
  • Published 04.04.2007 16:19:00
  • Last modified 09.04.2025 00:30:58

Unspecified kernel GDI functions in Microsoft Windows 2000 SP4; XP SP2; and Server 2003 Gold, SP1, and SP2 allows user-assisted remote attackers to cause a denial of service (possibly persistent restart) via a crafted Windows Metafile (WMF) image tha...

  • EPSS 2.14%
  • Published 04.04.2007 16:19:00
  • Last modified 09.04.2025 00:30:58

Buffer overflow in the Graphics Device Interface (GDI) in Microsoft Windows 2000 SP4; XP SP2; Server 2003 Gold, SP1, and SP2; and Vista allows local users to gain privileges via a crafted Enhanced Metafile (EMF) image format file.

  • EPSS 2.74%
  • Published 04.04.2007 16:19:00
  • Last modified 09.04.2025 00:30:58

Buffer overflow in the Graphics Device Interface (GDI) in Microsoft Windows 2000 SP4; XP SP2; Server 2003 Gold, SP1, and SP2; and Vista allows local users to gain privileges via certain "color-related parameters" in crafted images.

  • EPSS 88.34%
  • Published 30.03.2007 20:19:00
  • Last modified 09.04.2025 00:30:58

Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) a...

  • EPSS 59.33%
  • Published 30.03.2007 00:19:00
  • Last modified 09.04.2025 00:30:58

Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a malformed ANI file, which results in memory corruption when processing curs...

  • EPSS 32.54%
  • Published 26.03.2007 23:19:00
  • Last modified 09.04.2025 00:30:58

The default configuration of Microsoft Windows uses the Web Proxy Autodiscovery Protocol (WPAD) without static WPAD entries, which might allow remote attackers to intercept web traffic by registering a proxy server using WINS or DNS, then responding ...

  • EPSS 1.02%
  • Published 20.03.2007 22:19:00
  • Last modified 09.04.2025 00:30:58

\Device\NdisTapi (NDISTAPI.sys) in Microsoft Windows XP SP2 and 2003 SP1 uses weak permissions, which allows local users to write to the device and cause a denial of service, as demonstrated by using an IRQL to acquire a spinlock on paged memory via ...