Vulnerabilities > Microsoft > Windows 2003 Server > standard.64.bit

DATE CVE VULNERABILITY TITLE RISK
2006-02-14 CVE-2006-0008 Permissions, Privileges, and Access Controls vulnerability in Microsoft Office, Windows 2003 Server and Windows XP
The ShellAbout API call in Korean Input Method Editor (IME) in Korean versions of Microsoft Windows XP SP1 and SP2, Windows Server 2003 up to SP1, and Office 2003, allows local users to gain privileges by launching the "shell about dialog box" and clicking the "End-User License Agreement" link, which executes Notepad with the privileges of the program that displays the about box.
local
low complexity
microsoft CWE-264
7.2
2006-02-14 CVE-2006-0005 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft products
Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
network
microsoft CWE-119
critical
9.3
2006-01-10 CVE-2006-0010 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft products
Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote attackers to execute arbitrary code via an e-mail message or web page with a crafted Embedded Open Type (EOT) web font that triggers the overflow during decompression.
network
microsoft CWE-119
critical
9.3
2006-01-09 CVE-2006-0143 Resource Management Errors vulnerability in Microsoft products
Microsoft Windows Graphics Rendering Engine (GRE) allows remote attackers to corrupt memory and cause a denial of service (crash) via a WMF file containing (1) ExtCreateRegion or (2) ExtEscape function calls with arguments with inconsistent lengths.
network
low complexity
microsoft CWE-399
7.5
2005-08-10 CVE-2005-1218 Remote Desktop Protocol Denial Of Service vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows XP
The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests.
network
low complexity
microsoft
5.0
2005-06-14 CVE-2005-1214 Unspecified vulnerability in Microsoft products
Microsoft Agent allows remote attackers to spoof trusted Internet content and execute arbitrary code by disguising security prompts on a malicious Web page.
network
high complexity
microsoft
5.1
2005-06-14 CVE-2005-1212 Buffer Overflow vulnerability in Microsoft Step-By-Step Interactive Training Bookmark Link
Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field.
network
low complexity
microsoft
7.5
2005-06-14 CVE-2005-1208 Remote Code Execution vulnerability in Microsoft Windows HTML Help
Integer overflow in Microsoft Windows 98, 2000, XP SP2 and earlier, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via a crafted compiled Help (.CHM) file with a large size field that triggers a heap-based buffer overflow, as demonstrated using a "ms-its:" URL in Internet Explorer.
network
low complexity
microsoft
critical
10.0
2005-05-31 CVE-2005-0356 Remote Denial Of Service vulnerability in Multiple Vendor TCP Timestamp PAWS
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
5.0
2005-05-02 CVE-2005-1184 Denial Of Service vulnerability in Multiple Vendor TCP Session Acknowledgement Number
The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets.
network
low complexity
microsoft
5.0