Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2003 server sp1 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2015-1680
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a...
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
Microsoft Windows Vista -
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2012 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2003 -
1 EDB exploit
5
CVSSv2
CVE-2015-1716
Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict Diffie-Hellman Ephemeral (DHE) key lengths, which m...
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 R2
Microsoft Windows Vista -
Microsoft Windows Rt -
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Server 2012 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2003 -
2.1
CVSSv2
CVE-2015-1679
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a...
Microsoft Windows Server 2008 -
Microsoft Windows Vista -
Microsoft Windows Server 2003 -
Microsoft Windows Rt -
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows 7 -
1 EDB exploit
7.2
CVSSv2
CVE-2015-1701
Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
Microsoft Windows Vista
Microsoft Windows 2003 Server
Microsoft Windows Server 2008 -
Microsoft Windows 7
2 EDB exploits
14 Github repositories
3 Articles
7.2
CVSSv2
CVE-2015-1643
Microsoft Windows Server 2003 R2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privileges...
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows Rt -
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 -
Microsoft Windows Vista -
Microsoft Windows Server 2003 R2
Microsoft Windows Server 2003 -
Microsoft Windows 7 -
7.2
CVSSv2
CVE-2015-1644
Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privilege...
Microsoft Windows 8.1 -
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows Rt -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2003 -
Microsoft Windows Server 2003 R2
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 R2
Microsoft Windows 7 -
Microsoft Windows Vista -
9.3
CVSSv2
CVE-2015-1645
Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote malicious users to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability."
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Vista
Microsoft Windows Server 2003
4.3
CVSSv2
CVE-2015-0005
The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote malicious users to spoof the computer name of a secure channel's endpoint, and obtain sen...
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 -
Microsoft Windows 2003 Server
Microsoft Windows Server 2008
7.2
CVSSv2
CVE-2015-0073
The Windows Registry Virtualization feature in the kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict changes to virtual stores, ...
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 7 -
Microsoft Windows Server 2008 -
Microsoft Windows Vista -
Microsoft Windows Server 2003 -
Microsoft Windows 8 -
2.1
CVSSv2
CVE-2015-0077
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly initialize function buffers, which allows local...
Microsoft Windows Rt -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows 8 -
Microsoft Windows Vista -
Microsoft Windows Server 2003 -
Microsoft Windows Rt 8.1 -
Microsoft Windows 7 -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »