Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2003 server 64-bit vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2006-3445
Integer overflow in the ReadWideString function in agentdpv.dll in Microsoft Agent on Microsoft Windows 2000 SP4, XP SP2, and Server 2003 up to SP1 allows remote malicious users to execute arbitrary code via a large length value in an .ACF file, which results in a heap-based buff...
Microsoft Windows Xp
Microsoft Windows 2003 Server Itanium
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
7.5
CVSSv2
CVE-2006-3873
Heap-based buffer overflow in URLMON.DLL in Microsoft Internet Explorer 6 SP1 on Windows 2000 and XP SP1, with versions the MS06-042 patch prior to 20060912, allows remote malicious users to cause a denial of service (crash) or execute arbitrary code via a long URL in a GZIP-enco...
Microsoft Ie 6.0
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Itanium
Microsoft Windows 2003 Server Sp1
Microsoft Windows Xp
Microsoft Windows 2003 Server R2
Microsoft Windows 2000
7.5
CVSSv2
CVE-2006-1314
Heap-based buffer overflow in the Server Service (SRV.SYS driver) in Microsoft Windows 2000 SP4, XP SP1 and SP2, Server 2003 up to SP1, and other products, allows remote malicious users to execute arbitrary code via crafted first-class Mailslot messages that triggers memory corru...
Microsoft Windows 2003 Server Itanium
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Sp1
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
1 EDB exploit
7.5
CVSSv2
CVE-2005-2123
Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote malicious users to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-b...
Microsoft Windows Xp
Microsoft Windows 2003 Server Itanium
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
1 EDB exploit
7.5
CVSSv2
CVE-2005-1978
COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote malicious users to execute arbitrary code.
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2003 Server Itanium
Microsoft Windows 2003 Server R2
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
1 EDB exploit
7.5
CVSSv2
CVE-2005-1212
Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote malicious users to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Web
Microsoft Windows 98
Microsoft Windows Xp
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows Me
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 98se
7.5
CVSSv2
CVE-2005-1935
Heap-based buffer overflow in the BERDecBitString function in Microsoft ASN.1 library (MSASN1.DLL) allows remote malicious users to execute arbitrary code via nested constructed bit strings, which leads to a realloc of a non-null pointer and causes the function to overwrite previ...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server R2
7.5
CVSSv2
CVE-2004-0567
The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote malicious users to execute arb...
Microsoft Windows 2003 Server R2
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
1 EDB exploit
7.5
CVSSv2
CVE-2003-0812
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote malicious users to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the Net...
Microsoft Windows 2000
Microsoft Windows Xp
4 EDB exploits
7.5
CVSSv2
CVE-2003-0469
Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "...
Microsoft Windows 98se
Microsoft Windows Me
Microsoft Windows Nt 4.0
Microsoft Windows 2003 Server R2
Microsoft Windows 98
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
Microsoft Windows Xp
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »