Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Windows_nt
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 253 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2003-12-31 | CVE-2003-1407 | Buffer overflow in cmd.exe in Windows NT 4.0 may allow local users to execute arbitrary code via a long pathname argument to the cd command. | Windows_nt | N/A | ||
2003-12-31 | CVE-2003-1357 | ProxyView has a default administrator password of Administrator for Embedded Windows NT, which allows remote attackers to gain access. | Windows_nt, Proxyview | N/A | ||
2004-06-01 | CVE-2003-0910 | The NtSetLdtEntries function in the programming interface for the Local Descriptor Table (LDT) in Windows NT 4.0 and Windows 2000 allows local attackers to gain access to kernel memory and execute arbitrary code via an expand-down data segment descriptor descriptor that points to protected memory. | Windows_2000, Windows_nt | N/A | ||
2004-06-01 | CVE-2003-0906 | Buffer overflow in the rendering for (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1 allows remote attackers to execute arbitrary code via a malformed WMF or EMF image. | Windows_2000, Windows_nt, Windows_xp | N/A | ||
2004-06-01 | CVE-2003-0807 | Buffer overflow in the COM Internet Services and in the RPC over HTTP Proxy components for Microsoft Windows NT Server 4.0, NT 4.0 Terminal Server Edition, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service via a crafted request. | Windows_2000, Windows_2003_server, Windows_nt, Windows_xp | N/A | ||
2004-06-01 | CVE-2003-0806 | Buffer overflow in the Windows logon process (winlogon) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1, when a member of a domain, allows remote attackers to execute arbitrary code. | Windows_2000, Windows_nt, Windows_xp | N/A | ||
2004-06-01 | CVE-2003-0719 | Buffer overflow in the Private Communications Transport (PCT) protocol implementation in the Microsoft SSL library, as used in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via PCT 1.0 handshake packets. | Netmeeting, Windows_2000, Windows_2003_server, Windows_98, Windows_me, Windows_nt, Windows_xp | N/A | ||
2004-06-01 | CVE-2003-0533 | Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm. | Netmeeting, Windows_2000, Windows_2003_server, Windows_98, Windows_me, Windows_nt, Windows_xp | N/A | ||
2003-08-27 | CVE-2003-0525 | The getCanonicalPath function in Windows NT 4.0 may free memory that it does not own and cause heap corruption, which allows attackers to cause a denial of service (crash) via requests that cause a long file name to be passed to getCanonicalPath, as demonstrated on the IBM JVM using a long string to the java.io.getCanonicalPath Java method. | Windows_nt | N/A | ||
2003-08-07 | CVE-2003-0469 | Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag. | Windows_2000, Windows_2003_server, Windows_98, Windows_98se, Windows_me, Windows_nt, Windows_xp | N/A |