Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows server 2003 - vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv3
CVE-2008-1447
The DNS protocol, as implemented in (1) BIND 8 and 9 prior to 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote malicious users to spoof DNS traffic via a birthday attack th...
Isc Bind 4
Isc Bind 8
Isc Bind 9.2.9
3 EDB exploits
4 Nmap scripts
1 Github repository
6.6
CVSSv3
CVE-2017-11885
Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allow a remote code execution vulnerability due to the way the Routing and Remot...
Microsoft Windows 10 -
Microsoft Windows 10 1511
Microsoft Windows 10 1607
Microsoft Windows 10 1703
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2016 1709
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 10 1709
Microsoft Windows 8.1
Microsoft Windows Server 2016 -
1 EDB exploit
1 Article
5.5
CVSSv3
CVE-2006-2374
The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows local users to cause a denial of service (hang) by calling the MrxSmbCscIoctlCloseForCopyChunk with the file handle of the shadow dev...
Microsoft Windows Xp -
Microsoft Windows 2000 -
Microsoft Windows 2003 Server -
2 EDB exploits
NA
CVE_2021_38647
CVE-2021-38647 AKA "OMIGOD" A Zeek package which detects CVE-2021-38647 AKA OMIGOD exploit attempts. https://corelight.com/blog/detecting-cve-2021-38647-omigod https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure https://msrc.microsoft.com/update-guide/v...
1 Github repository
NA
CVE-2015-2363
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application...
Microsoft Windows 2003 Server
Microsoft Windows 2003 Server R2
Microsoft Windows Server 2012 -
Microsoft Windows Rt -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 8 -
Microsoft Windows 8.1 -
1 Article
NA
CVE-2015-2370
The authentication implementation in the RPC subsystem in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not prevent DCE/...
Microsoft Windows Vista
Microsoft Windows Server 2008 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Rt -
Microsoft Windows 2003 Server
Microsoft Windows 2003 Server R2
Microsoft Windows Server 2012 -
1 EDB exploit
1 Github repository
2 Articles
NA
CVE-2015-2387
ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges v...
Microsoft Windows 2003 Server
Microsoft Windows 2003 Server R2
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 -
Microsoft Windows Server 2008 R2
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows 8 -
Microsoft Windows 8.1 -
Microsoft Windows 7 -
Microsoft Windows Vista
1 Github repository
1 Article
NA
CVE-2015-2364
The graphics component in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted a...
Microsoft Windows Server 2008 R2
Microsoft Windows 8 -
Microsoft Windows 2003 Server
Microsoft Windows 2003 Server R2
Microsoft Windows Server 2012 R2
Microsoft Windows 7 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Vista
Microsoft Windows Server 2008 -
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
1 Article
NA
CVE-2015-2365
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges ...
Microsoft Windows 7 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Vista
Microsoft Windows Server 2008 -
Microsoft Windows Server 2012 R2
Microsoft Windows Rt -
Microsoft Windows 2003 Server
Microsoft Windows 2003 Server R2
Microsoft Windows Server 2008 R2
Microsoft Windows 8 -
Microsoft Windows Rt 8.1 -
1 EDB exploit
1 Github repository
1 Article
NA
CVE-2015-2367
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive...
Microsoft Windows 8 -
Microsoft Windows 8.1 -
Microsoft Windows Vista
Microsoft Windows Server 2008 -
Microsoft Windows Rt -
Microsoft Windows Server 2012 R2
Microsoft Windows 2003 Server
Microsoft Windows 2003 Server R2
Microsoft Windows Server 2012 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »