Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2003 server web vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2003-0719
Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote malicious users to execut...
Microsoft Netmeeting
Microsoft Windows Me
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server R2
Microsoft Windows 98
2 EDB exploits
7.5
CVSSv2
CVE-2003-0818
Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote malicious users to execute arbitrary code via ASN.1 BER encodings with (1) very large...
Microsoft Windows 2000
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Standard
3 EDB exploits
7.5
CVSSv2
CVE-2003-0822
Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote malicious users to execute arbitrary code via a crafted chunked encoded request.
Microsoft Frontpage Server Extensions 2000
Microsoft Frontpage Server Extensions 2002
Microsoft Sharepoint Team Services 2002
Microsoft Windows 2000
Microsoft Windows Xp
2 EDB exploits
7.5
CVSSv2
CVE-2003-0660
The Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote malicious users to execute arbitrary code without user approval.
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server R2
7.5
CVSSv2
CVE-2003-0711
Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote malicious users to execute arbitrary code via a long query in an HCP URL.
Microsoft Windows 2000
Microsoft Windows 2003 Server Web
Microsoft Windows Me
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
7.5
CVSSv2
CVE-2003-0717
The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote malicious users to execute arbitrary code via a buffer overflow attack.
Microsoft Windows 2000
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows Me
Microsoft Windows 2003 Server Enterprise
4 EDB exploits
7.5
CVSSv2
CVE-2003-0352
Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote malicious users to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
Microsoft Windows 2000
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Enterprise
3 EDB exploits
2 Github repositories
7.5
CVSSv2
CVE-2003-0016
Apache prior to 2.0.44, when running on unpatched Windows 9x and Me operating systems, allows remote malicious users to cause a denial of service or execute arbitrary code via an HTTP request containing MS-DOS device names.
Apache Http Server 2.0.42
Apache Http Server 2.0.37
Apache Http Server 2.0.39
Apache Http Server 2.0.41
Apache Http Server 2.0.38
Apache Http Server 2.0.40
Apache Http Server 2.0.36
Apache Http Server 2.0.43
7.2
CVSSv2
CVE-2011-1229
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a...
Microsoft Windows 2003 Server -
Microsoft Windows 7 -
Microsoft Windows Server 2003 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008 R2
Microsoft Windows Vista -
Microsoft Windows Xp -
Avaya Agent Access
Avaya Aura Conferencing Standard Edition 6.0.0
Avaya Basic Call Management System Reporting Desktop
Avaya Call Management Server Supervisor
Avaya Callpilot
Avaya Callvisor Asai Lan
Avaya Communication Server 1000 Telephony Manager
Avaya Computer Telephony
Avaya Contact Center Express
Avaya Customer Interaction Express
Avaya Enterprise Manager
Avaya Integrated Management
Avaya Interaction Center
Avaya Ip Agent
Avaya Ip Softphone
7.2
CVSSv2
CVE-2006-0008
The ShellAbout API call in Korean Input Method Editor (IME) in Korean versions of Microsoft Windows XP SP1 and SP2, Windows Server 2003 up to SP1, and Office 2003, allows local users to gain privileges by launching the "shell about dialog box" and clicking the "End...
Microsoft Office 2003
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Standard 64-bit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »