Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Windows_nt
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 253 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2003-11-17 | CVE-2003-0711 | Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL. | Windows_2000, Windows_2003_server, Windows_me, Windows_nt, Windows_xp | N/A | ||
2003-10-20 | CVE-2003-0661 | The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information. | Windows_2000, Windows_2003_server, Windows_nt, Windows_xp | N/A | ||
2003-11-17 | CVE-2003-0660 | The Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers to execute arbitrary code without user approval. | Windows_2000, Windows_2003_server, Windows_nt, Windows_xp | N/A | ||
2003-11-17 | CVE-2003-0659 | Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application. | Windows_2000, Windows_2003_server, Windows_nt, Windows_xp | N/A | ||
2003-09-17 | CVE-2003-0528 | Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0715. | Windows_2000, Windows_2003_server, Windows_nt, Windows_xp | N/A | ||
2003-08-18 | CVE-2003-0352 | Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms. | Windows_2000, Windows_2003_server, Windows_nt, Windows_xp | N/A | ||
2003-08-18 | CVE-2003-0345 | Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required. | Windows_2000, Windows_nt, Windows_xp | N/A | ||
2003-05-12 | CVE-2003-0112 | Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger. | Windows_2000, Windows_2000_terminal_services, Windows_nt, Windows_xp | N/A | ||
2003-03-24 | CVE-2003-0010 | Integer overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a large array index value that enables a heap-based buffer overflow attack. | Windows_2000, Windows_2000_terminal_services, Windows_98, Windows_98se, Windows_me, Windows_nt, Windows_xp | N/A | ||
2003-02-07 | CVE-2003-0003 | Buffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information. | Windows_2000, Windows_2000_terminal_services, Windows_nt, Windows_xp | N/A |