Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2003 server standard vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-1982
Unknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller when PKINIT smart card aut...
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Web
Microsoft Windows Xp
Microsoft Windows 2000
NA
CVE-2005-1983
Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote malicious users to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by th...
Microsoft Windows Xp
Microsoft Windows 2000
4 EDB exploits
NA
CVE-2005-2388
Buffer overflow in a certain USB driver, as used on Microsoft Windows, allows malicious users to execute arbitrary code.
Microsoft Windows Xp
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 98se
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows Me
Microsoft Windows 98
Microsoft Windows 95
NA
CVE-2005-1205
The Telnet client for Microsoft Windows XP, Windows Server 2003, and Windows Services for UNIX allows remote malicious users to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
NA
CVE-2005-1212
Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote malicious users to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Web
Microsoft Windows 98
Microsoft Windows Xp
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows Me
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 98se
NA
CVE-2005-1214
Microsoft Agent allows remote malicious users to spoof trusted Internet content and execute arbitrary code by disguising security prompts on a malicious Web page.
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 98se
Microsoft Windows Me
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Web
Microsoft Windows 98
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Standard 64-bit
NA
CVE-2005-1208
Integer overflow in Microsoft Windows 98, 2000, XP SP2 and previous versions, and Server 2003 SP1 and previous versions allows remote malicious users to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overfl...
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows 98
Microsoft Windows Xp
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows 2003 Server Web
Microsoft Windows 2000
NA
CVE-2005-1649
The IPv6 support in Windows XP SP2, 2003 Server SP1, and Longhorn, with Windows Firewall turned off, allows remote malicious users to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, a variant...
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Web
Microsoft Windows Xp
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 2003 Server Standard
1 EDB exploit
NA
CVE-2005-1184
The TCP/IP stack in multiple operating systems allows remote malicious users to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NO...
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows Nt 4.0
Microsoft Windows 2003 Server R2
Microsoft Windows 98se
Microsoft Windows Xp
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Web
1 EDB exploit
NA
CVE-2005-0045
The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote malicious users to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the...
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server R2
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »