Microsoft

Windows 2003 Server

405 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 21.56%
  • Veröffentlicht 10.04.2007 23:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in Microsoft Windows allows user-assisted remote attackers to have an unknown impact via a crafted .HLP file.

  • EPSS 65.75%
  • Veröffentlicht 10.04.2007 21:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in Microsoft Agent (msagent\agentsvr.exe) in Windows 2000 SP4, XP SP2, and Server 2003, 2003 SP1, and 2003 SP2 allows remote attackers to execute arbitrary code via crafted URLs, which result in memory corruption.

  • EPSS 2.12%
  • Veröffentlicht 10.04.2007 21:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0; 2000 SP4; XP SP2; Server 2003, 2003 SP1, and 2003 SP2; and Windows Vista before June 2006; uses insecure permissions (PAGE_READWRITE) for a physical memory view, which a...

  • EPSS 75.74%
  • Veröffentlicht 04.04.2007 16:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified kernel GDI functions in Microsoft Windows 2000 SP4; XP SP2; and Server 2003 Gold, SP1, and SP2 allows user-assisted remote attackers to cause a denial of service (possibly persistent restart) via a crafted Windows Metafile (WMF) image tha...

  • EPSS 2.14%
  • Veröffentlicht 04.04.2007 16:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the Graphics Device Interface (GDI) in Microsoft Windows 2000 SP4; XP SP2; Server 2003 Gold, SP1, and SP2; and Vista allows local users to gain privileges via a crafted Enhanced Metafile (EMF) image format file.

  • EPSS 2.74%
  • Veröffentlicht 04.04.2007 16:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the Graphics Device Interface (GDI) in Microsoft Windows 2000 SP4; XP SP2; Server 2003 Gold, SP1, and SP2; and Vista allows local users to gain privileges via certain "color-related parameters" in crafted images.

  • EPSS 88.34%
  • Veröffentlicht 30.03.2007 20:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) a...

  • EPSS 59.33%
  • Veröffentlicht 30.03.2007 00:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a malformed ANI file, which results in memory corruption when processing curs...

  • EPSS 32.54%
  • Veröffentlicht 26.03.2007 23:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The default configuration of Microsoft Windows uses the Web Proxy Autodiscovery Protocol (WPAD) without static WPAD entries, which might allow remote attackers to intercept web traffic by registering a proxy server using WINS or DNS, then responding ...

  • EPSS 1.02%
  • Veröffentlicht 20.03.2007 22:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

\Device\NdisTapi (NDISTAPI.sys) in Microsoft Windows XP SP2 and 2003 SP1 uses weak permissions, which allows local users to write to the device and cause a denial of service, as demonstrated by using an IRQL to acquire a spinlock on paged memory via ...