Vulnerabilities > Microsoft > Windows 2003 Server

DATE CVE VULNERABILITY TITLE RISK
2015-07-14 CVE-2015-2369 Unspecified vulnerability in Microsoft products
Untrusted search path vulnerability in Windows Media Device Manager in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rtf file, aka "DLL Planting Remote Code Execution Vulnerability." <a href="http://cwe.mitre.org/data/definitions/426.html">CWE-426: Untrusted Search Path</a>
local
microsoft
6.9
2015-06-10 CVE-2015-1768 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Windows 2003 Server and Windows Server 2003
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability."
local
low complexity
microsoft CWE-119
7.2
2015-04-21 CVE-2015-1701 Permissions, Privileges, and Access Controls vulnerability in Microsoft products
Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
local
low complexity
microsoft CWE-264
7.2
2015-03-11 CVE-2015-0075 Permissions, Privileges, and Access Controls vulnerability in Microsoft products
The kernel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 does not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka "Impersonation Level Check Elevation of Privilege Vulnerability."
local
low complexity
microsoft CWE-264
7.2
2015-03-11 CVE-2015-0005 7PK - Security Features vulnerability in Microsoft products
The NETLOGON service in Microsoft Windows Server 2003 SP2, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold and R2, when a Domain Controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, aka "NETLOGON Spoofing Vulnerability."
4.3
2013-11-28 CVE-2013-5065 Improper Input Validation vulnerability in Microsoft Windows 2003 Server and Windows XP
NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013.
local
low complexity
microsoft CWE-20
7.2
2013-07-31 CVE-2013-3956 Permissions, Privileges, and Access Controls vulnerability in Novell Client 2.0/4.91
The NICM.SYS kernel driver 3.1.11.0 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003; Novell Client 2 SP2 on Windows Vista and Windows Server 2008; and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted 0x143B6B IOCTL call.
local
low complexity
novell microsoft CWE-264
7.2
2013-07-31 CVE-2013-3697 Numeric Errors vulnerability in Novell Client 2.0/4.91
Integer overflow in the NWFS.SYS kernel driver 4.91.5.8 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003 and the NCPL.SYS kernel driver in Novell Client 2 SP2 on Windows Vista and Windows Server 2008 and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 might allow local users to gain privileges via a crafted 0x1439EB IOCTL call.
local
low complexity
novell microsoft CWE-189
7.2
2013-03-05 CVE-2013-0931 Configuration vulnerability in RSA Authentication Agent for Windows 7.1/7.1.1
EMC RSA Authentication Agent 7.1.x before 7.1.2 on Windows does not enforce the Quick PIN Unlock timeout feature, which allows physically proximate attackers to bypass the passcode requirement for a screensaved session by entering a PIN after timeout expiration.
5.4
2013-02-18 CVE-2012-6533 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Symantec Encryption Desktop and PGP Desktop
Buffer overflow in pgpwded.sys in Symantec PGP Desktop 10.x and Encryption Desktop 10.3.0 before MP1 on Windows XP and Server 2003 allows local users to gain privileges via a crafted application.
4.4