Microsoft

Windows 2003 Server

405 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 26.52%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability...

  • EPSS 0.93%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges,...

  • EPSS 1.6%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.

  • EPSS 30.19%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site,...

  • EPSS 89.33%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS re...

  • EPSS 66.16%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote ...

Exploit
  • EPSS 54.19%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and I...

Exploit
  • EPSS 49.04%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file.

  • EPSS 1.27%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Windows 2000, XP, and possibly 2003 allows local users with the SeDebugPrivilege privilege to execute arbitrary code as kernel and read or write kernel memory via the NtSystemDebugControl function, which does not verify its pointer argument...

Exploit
  • EPSS 0.24%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Memory leak in Microsoft Windows XP and Windows Server 2003 allows local users to cause a denial of service (memory exhaustion) by repeatedly creating and deleting directories using a non-standard tool such as smbmount.