Vulnerabilities > Microsoft > Windows 2003 Server > 2003
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-02-12 | CVE-2008-0080 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft Webdav Mini-Redirector Heap-based buffer overflow in the WebDAV Mini-Redirector in Microsoft Windows XP SP2, Server 2003 SP1 and SP2, and Vista allows remote attackers to execute arbitrary code via a crafted WebDAV response. | 10.0 |
2007-02-13 | CVE-2007-0025 | Code Injection vulnerability in Microsoft Visual Studio .Net and Windows 2003 Server The MFC component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1 and Visual Studio .NET 2000, 2002 SP1, 2003, and 2003 SP1 allows user-assisted remote attackers to execute arbitrary code via an RTF file with a malformed OLE object that triggers memory corruption. | 9.3 |
2005-05-02 | CVE-2005-0050 | Improper Input Validation vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows NT The License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked buffer" and allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, aka the "License Logging Service Vulnerability." | 10.0 |
2005-01-27 | CVE-2004-0892 | Unspecified vulnerability in Microsoft ISA Server, Proxy Server and Windows 2003 Server Microsoft Proxy Server 2.0 and Microsoft ISA Server 2000 (which is included in Small Business Server 2000 and Small Business Server 2003 Premium Edition) allows remote attackers to spoof trusted Internet content on a specially crafted webpage via spoofed reverse DNS lookup results. | 7.5 |
2005-01-10 | CVE-2004-1080 | Remote Memory Corruption vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows NT The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." | 10.0 |