Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows server 2003 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2015-1678
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a...
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Server 2012 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2003 -
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 R2
Microsoft Windows Vista -
1 EDB exploit
2.1
CVSSv2
CVE-2015-1679
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a...
Microsoft Windows Server 2008 -
Microsoft Windows Vista -
Microsoft Windows Server 2003 -
Microsoft Windows Rt -
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows 7 -
1 EDB exploit
2.1
CVSSv2
CVE-2015-1680
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a...
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
Microsoft Windows Vista -
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2012 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2003 -
1 EDB exploit
7.2
CVSSv2
CVE-2015-1701
Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
Microsoft Windows Vista
Microsoft Windows 2003 Server
Microsoft Windows Server 2008 -
Microsoft Windows 7
2 EDB exploits
14 Github repositories
3 Articles
7.2
CVSSv2
CVE-2015-1643
Microsoft Windows Server 2003 R2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privileges...
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows Rt -
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 -
Microsoft Windows Vista -
Microsoft Windows Server 2003 R2
Microsoft Windows Server 2003 -
Microsoft Windows 7 -
7.2
CVSSv2
CVE-2015-1644
Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privilege...
Microsoft Windows 8.1 -
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows Rt -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2008 -
Microsoft Windows Server 2003 -
Microsoft Windows Server 2003 R2
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 R2
Microsoft Windows 7 -
Microsoft Windows Vista -
9.3
CVSSv2
CVE-2015-1645
Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote malicious users to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability."
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Vista
Microsoft Windows Server 2003
4.3
CVSSv2
CVE-2015-0005
The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote malicious users to spoof the computer name of a secure channel's endpoint, and obtain sen...
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 -
Microsoft Windows 2003 Server
Microsoft Windows Server 2008
9.3
CVSSv2
CVE-2015-0092
Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote malicious users to execute arbitrary code via a crafted...
Microsoft Windows Server 2012 R2
Microsoft Windows 8.1 -
Microsoft Windows 8 -
Microsoft Windows Server 2008 R2
Microsoft Windows Rt 8.1 -
Microsoft Windows 7 -
Microsoft Windows Vista -
Microsoft Windows Server 2003 -
Microsoft Windows Rt -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2008 -
9.3
CVSSv2
CVE-2015-0096
Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan ...
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2003 -
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Server 2008 -
Microsoft Windows Vista -
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
1 EDB exploit
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »