Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows 2003 server standard vulnerabilities and exploits
(subscribe to this query)
730
VMScore
CVE-2003-0659
Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application.
Microsoft Windows 2003 Server R2
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
2 EDB exploits
725
VMScore
CVE-2005-0047
Windows 2000, XP, and Server 2003 does not properly "validate the use of memory regions" for COM structured storage files, which allows malicious users to execute arbitrary code, aka the "COM Structured Storage Vulnerability."
Microsoft Windows Xp
Microsoft Windows 2003 Server R2
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
1 EDB exploit
725
VMScore
CVE-2004-0894
LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program.
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Xp
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Datacenter 64-bit
1 EDB exploit
700
VMScore
CVE-2006-6696
Double free vulnerability in Microsoft Windows 2000, XP, 2003, and Vista allows local users to gain privileges by calling the MessageBox function with a MB_SERVICE_NOTIFICATION message with crafted data, which sends a HardError message to Client/Server Runtime Server Subsystem (C...
Microsoft Windows 2000
Microsoft Windows 2003 Server Datacenter Edition
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise Edition
Microsoft Windows 2003 Server Sp1
Microsoft Windows Vista
2 EDB exploits
694
VMScore
CVE-2007-3038
The Teredo interface in Microsoft Windows Vista and Vista x64 Edition does not properly handle certain network traffic, which allows remote malicious users to bypass firewall blocking rules and obtain sensitive information via crafted IPv6 traffic, aka "Windows Vista Firewal...
Microsoft Windows Vista
694
VMScore
CVE-2005-3945
The SynAttackProtect protection in Microsoft Windows 2003 before SP1 and Windows 2000 before SP4 with Update Roll-up uses a hash of predictable data, which allows remote malicious users to cause a denial of service (CPU consumption) via a flood of SYN packets that produce identic...
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
668
VMScore
CVE-2006-2371
Buffer overflow in the Remote Access Connection Manager service (RASMAN) service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows remote unauthenticated or authenticated malicious users to execute arbitrary code via certain crafted &...
Microsoft Windows 2003 Server Datacenter Edition 64-bit
Microsoft Windows 2003 Server Standard
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Enterprise Edition
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server Enterprise Edition 64-bit
Microsoft Windows 2003 Server Datacenter Edition
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Sp1
668
VMScore
CVE-2006-0034
Heap-based buffer overflow in the CRpcIoManagerServer::BuildContext function in msdtcprx.dll for Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0 and Windows 2000 SP2 and SP3 allows remote malicious users to execute arbitrary code via a long fifth argument...
Microsoft Distributed Transaction Coordinator
Microsoft Windows 2000
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Enterprise
1 Github repository
668
VMScore
CVE-2005-1212
Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote malicious users to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Web
Microsoft Windows 98
Microsoft Windows Xp
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Standard 64-bit
Microsoft Windows Me
Microsoft Windows 2003 Server Datacenter 64-bit
Microsoft Windows 98se
668
VMScore
CVE-2005-0057
The Hyperlink Object Library for Windows 98, 2000, XP, and Server 2003 allows remote malicious users to execute arbitrary code via a crafted link that triggers an "unchecked buffer" in the library, possibly due to a buffer overflow.
Microsoft Windows 2003 Server R2
Microsoft Windows Xp
Microsoft Windows 98se
Microsoft Windows Me
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows 98
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »