Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows xp 2005 vulnerabilities and exploits
(subscribe to this query)
790
VMScore
CVE-2005-4360
The URL parser in Microsoft Internet Information Services (IIS) 5.1 on Windows XP Professional SP2 allows remote malicious users to execute arbitrary code via multiple requests to ".dll" followed by arguments such as "~0" through "~9", which causes n...
Microsoft Internet Information Services 5.1
2 EDB exploits
785
VMScore
CVE-2005-3644
PNP_GetDeviceList (upnp_getdevicelist) in UPnP for Microsoft Windows 2000 SP4 and previous versions, and possibly Windows XP SP1 and previous versions, allows remote malicious users to cause a denial of service (memory consumption) via a DCE RPC request that specifies a large out...
Microsoft Windows 2000
Microsoft Windows Xp
1 EDB exploit
770
VMScore
CVE-2005-2124
Unspecified vulnerability in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1, related to "An unchecked buffer" and possibly buffer overflows, allows remote malicious users to execute arbitrary code via a crafted Windows...
Microsoft Windows 2003 Server Sp1
Microsoft Windows Xp
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Itanium
Microsoft Windows 2003 Server R2
Microsoft Windows 2000
2 EDB exploits
765
VMScore
CVE-2005-0048
Microsoft Windows XP SP2 and previous versions, 2000 SP3 and SP4, Server 2003, and older operating systems allows remote malicious users to cause a denial of service and possibly execute arbitrary code via crafted IP packets with malformed options, aka the "IP Validation Vul...
Microsoft Windows Xp
Microsoft Windows 2000
3 EDB exploits
760
VMScore
CVE-2005-0416
The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allows remote malicious users to execute arbitrary code via the AnimationHeaderBlock length field, which leads to a stack-based buffer overflow.
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server Web
Microsoft Windows 98
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Standard
Microsoft Windows Nt 4.0
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 98se
Microsoft Windows Me
Microsoft Windows Xp
2 EDB exploits
755
VMScore
CVE-2005-4560
The Windows Graphical Device Interface library (GDI32.DLL) in Microsoft Windows allows remote malicious users to execute arbitrary code via a Windows Metafile (WMF) format image with a crafted SETABORTPROC GDI Escape function call, related to the Windows Picture and Fax Viewer (S...
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server R2
1 EDB exploit
755
VMScore
CVE-2005-2123
Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote malicious users to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-b...
Microsoft Windows Xp
Microsoft Windows 2003 Server Itanium
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
1 EDB exploit
755
VMScore
CVE-2005-1978
COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote malicious users to execute arbitrary code.
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2003 Server Itanium
Microsoft Windows 2003 Server R2
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
1 EDB exploit
755
VMScore
CVE-2005-0058
Buffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows malicious users to elevate privileges or execute arbitrary code via a crafted message.
Microsoft Windows 2000
Microsoft Windows 98se
Microsoft Windows Me
Microsoft Windows 2003 Server R2
Microsoft Windows 98
Microsoft Windows Xp
1 EDB exploit
755
VMScore
CVE-2005-0045
The Server Message Block (SMB) implementation for Windows NT 4.0, 2000, XP, and Server 2003 does not properly validate certain SMB packets, which allows remote malicious users to execute arbitrary code via Transaction responses containing (1) Trans or (2) Trans2 commands, aka the...
Microsoft Windows 2000
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows Nt 4.0
Microsoft Windows Xp
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows 2003 Server R2
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »