Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows server 2003 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2007-1748
Stack-based buffer overflow in the RPC interface in the Domain Name System (DNS) Server Service in Microsoft Windows 2000 Server SP 4, Server 2003 SP 1, and Server 2003 SP 2 allows remote malicious users to execute arbitrary code via a long zone name containing character constant...
Microsoft Windows 2003 Server Sp2
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2000
5 EDB exploits
1 Nmap script
1000
VMScore
CVE-2007-0038
Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote malicious users to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI...
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2003 Server Sp2
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server Gold
Microsoft Windows Vista
15 EDB exploits
1000
VMScore
CVE-2006-3439
Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314.
Microsoft Windows 2003 Server R2
Microsoft Windows 2003 Server Sp1
Microsoft Windows 2000
Microsoft Windows Xp
Microsoft Windows 2003 Server 64-bit
Microsoft Windows 2003 Server Itanium
5 EDB exploits
1000
VMScore
CVE-2006-3440
Buffer overflow in the Winsock API in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote malicious users to execute arbitrary code via unknown vectors, aka "Winsock Hostname Vulnerability."
Microsoft Windows 2003 Server Sp1
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
1 EDB exploit
1000
VMScore
CVE-2006-3441
Buffer overflow in the DNS Client service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote malicious users to execute arbitrary code via a crafted record response. NOTE: while MS06-041 implies that there is a single issue, there are multiple vector...
Microsoft Windows 2003 Server Sp1
Microsoft Windows Xp
Microsoft Windows 2000
Microsoft Windows 2003 Server 64-bit
1 EDB exploit
1000
VMScore
CVE-2006-2372
Buffer overflow in the DHCP Client service for Microsoft Windows 2000 SP4, Windows XP SP1 and SP2, and Server 2003 up to SP1 allows remote malicious users to execute arbitrary code via a crafted DHCP response.
Microsoft Dhcp Client Service
1 EDB exploit
1000
VMScore
CVE-2006-2373
The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and previous versions allows local users to execute arbitrary code by calling the MrxSmbCscIoctlOpenForCopyChunk function with the METHOD_NEITHER method flag and ...
Microsoft Windows 2000 -
Microsoft Windows Xp -
Microsoft Windows Server 2003 -
2 EDB exploits
1000
VMScore
CVE-2005-1983
Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote malicious users to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by th...
Microsoft Windows Xp
Microsoft Windows 2000
4 EDB exploits
1000
VMScore
CVE-2005-0551
Stack-based buffer overflow in WINSRV.DLL in the Client Server Runtime System (CSRSS) process of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application that provides console window informa...
Microsoft Windows 2000
Microsoft Windows 2003 Server R2
Microsoft Windows Xp
1 EDB exploit
1000
VMScore
CVE-2004-1080
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote malicious users to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP ...
Microsoft Windows 2000
Microsoft Windows 2003 Server Enterprise
Microsoft Windows 2003 Server Enterprise 64-bit
Microsoft Windows Nt 4.0
Microsoft Windows 2003 Server Standard
Microsoft Windows 2003 Server Web
Microsoft Windows 2003 Server 2000
Microsoft Windows 2003 Server 2003
Microsoft Windows 2003 Server R2
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »