Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows xp sp3 vulnerabilities and exploits
(subscribe to this query)
8.3
CVSSv2
CVE-2008-1453
The Bluetooth stack in Microsoft Windows XP SP2 and SP3, and Vista Gold and SP1, allows physically proximate malicious users to execute arbitrary code via a large series of Service Discovery Protocol (SDP) packets.
Microsoft Windows Xp
Microsoft Windows-nt Xp
Microsoft Windows Vista
9.3
CVSSv2
CVE-2011-0028
WordPad in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly parse fields in Word documents, which allows remote malicious users to execute arbitrary code via a crafted .doc file, aka "WordPad Converter Parsing Vulnerability."
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2003
7.2
CVSSv2
CVE-2013-3899
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate addresses, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability."
Microsoft Windows Server 2003
Microsoft Windows Xp -
Microsoft Windows Xp
9.3
CVSSv2
CVE-2009-4210
The Indeo codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted media content.
Microsoft Windows 2000
Microsoft Windows Xp -
Microsoft Windows 2003 Server
Microsoft Windows Xp
7.2
CVSSv2
CVE-2011-0039
The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly process authentication requests, which allows local users to gain privileges via a request with a crafted length, aka "LSASS Length Validation Vul...
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows 2003 Server
6.9
CVSSv2
CVE-2013-3878
Stack-based buffer overflow in the LRPC client in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges by operating an LRPC server that sends a crafted LPC port message, aka "LRPC Client Buffer Overrun Vulnerability."
Microsoft Windows Server 2003
Microsoft Windows Xp -
Microsoft Windows Xp
9.3
CVSSv2
CVE-2009-4312
Unspecified vulnerability in the Indeo codec in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote malicious users to execute arbitrary code via crafted media content, as reported to Microsoft by Dave Lenoe of Adobe.
Microsoft Windows Xp -
Microsoft Windows 2003 Server
Microsoft Windows Xp
Microsoft Windows 2000
9.3
CVSSv2
CVE-2011-3397
The Microsoft Time component in DATIME.DLL in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows remote malicious users to execute arbitrary code via a crafted web site that leverages an unspecified "binary behavior" in Internet Explorer, aka "Microsoft Ti...
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2003
9.3
CVSSv2
CVE-2010-2567
The RPC client implementation in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly allocate memory during the parsing of responses, which allows remote RPC servers and man-in-the-middle malicious users to execute arbitrary code via a malformed response, aka &...
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2003
7.2
CVSSv2
CVE-2010-3222
Stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted LPC message that requests an LRPC connection from an LPC server to a client, aka "LPC Messag...
Microsoft Windows Xp -
Microsoft Windows Server 2003
Microsoft Windows Xp
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »