Microsoft

Windows 2003 Server

405 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 17.79%
  • Published 12.10.2011 02:52:43
  • Last modified 11.04.2025 00:51:21

Untrusted search path vulnerability in the Microsoft Active Accessibility component in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local user...

  • EPSS 4.95%
  • Published 12.10.2011 02:52:43
  • Last modified 11.04.2025 00:51:21

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows local ...

  • EPSS 61.72%
  • Published 12.10.2011 02:52:43
  • Last modified 11.04.2025 00:51:21

Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary...

  • EPSS 40.53%
  • Published 15.09.2011 12:26:49
  • Last modified 11.04.2025 00:51:21

Multiple untrusted search path vulnerabilities in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow local users to gain privileges via a Trojan hors...

  • EPSS 15.04%
  • Published 15.09.2011 12:26:48
  • Last modified 11.04.2025 00:51:21

WINS in Microsoft Windows Server 2003 SP2 and Server 2008 SP2, R2, and R2 SP1 allows local users to gain privileges by sending crafted packets over the loopback interface, aka "WINS Local Elevation of Privilege Vulnerability."

  • EPSS 0.24%
  • Published 10.08.2011 21:55:01
  • Last modified 11.04.2025 00:51:21

Winsrv.dll in the Client/Server Run-time Subsystem (aka CSRSS) in the Win32 subsystem in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not proper...

  • EPSS 73.63%
  • Published 10.08.2011 21:55:01
  • Last modified 11.04.2025 00:51:21

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly process packets in memory, which allows remote attackers to cause a denial of service (reboot) by sending crafted RDP p...

  • EPSS 61.47%
  • Published 10.08.2011 21:55:01
  • Last modified 11.04.2025 00:51:21

The DNS server in Microsoft Windows Server 2003 SP2 and Windows Server 2008 SP2, R2, and R2 SP1 does not properly initialize memory, which allows remote attackers to cause a denial of service (service outage) via a query for a nonexistent domain, aka...

  • EPSS 17.13%
  • Published 10.08.2011 21:55:01
  • Last modified 11.04.2025 00:51:21

NDISTAPI.sys in the NDISTAPI driver in Remote Access Service (RAS) in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka ...

  • EPSS 0.73%
  • Published 13.07.2011 23:55:01
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local user...