Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Windows_nt
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 253 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2005-01-10 | CVE-2004-0893 | The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." | Windows_2000, Windows_2003_server, Windows_nt, Windows_xp | N/A | ||
2005-01-10 | CVE-2004-0571 | Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901. | Windows_2000, Windows_2003_server, Windows_98, Windows_98se, Windows_me, Windows_nt, Windows_xp | N/A | ||
2005-01-10 | CVE-2004-0568 | HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. | Windows_2000, Windows_2003_server, Windows_nt, Windows_xp | N/A | ||
2004-12-31 | CVE-2004-0567 | The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability." | Windows_2000, Windows_2003_server, Windows_nt | N/A | ||
2004-08-06 | CVE-2004-0212 | Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share. | Definity_one_media_server, Ip600_media_servers, Modular_messaging_message_storage_server, S8100, Ie, Windows_2000, Windows_nt, Windows_xp | N/A | ||
2004-08-06 | CVE-2004-0201 | Heap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vulnerability than CVE-2003-1041. | Definity_one_media_server, Ip600_media_servers, Modular_messaging_message_storage_server, S8100, Windows_2000, Windows_2003_server, Windows_98, Windows_98se, Windows_me, Windows_nt, Windows_xp | N/A | ||
2004-03-03 | CVE-2003-0825 | The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code. | Windows_2000, Windows_2003_server, Windows_nt | N/A | ||
2004-03-03 | CVE-2003-0818 | Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings. | Windows_2000, Windows_2003_server, Windows_nt, Windows_xp | N/A | ||
2003-11-17 | CVE-2003-0717 | The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack. | Windows_2000, Windows_2003_server, Windows_me, Windows_nt, Windows_xp | N/A | ||
2003-09-17 | CVE-2003-0715 | Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528. | Windows_2000, Windows_2003_server, Windows_nt, Windows_xp | N/A |