Vulnerabilities > Microsoft > Windows Server 2003 > High

DATE CVE VULNERABILITY TITLE RISK
2020-02-20 CVE-2012-5364 Resource Exhaustion vulnerability in Microsoft products
The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.
network
low complexity
microsoft CWE-400
7.5
2020-02-20 CVE-2012-5362 Resource Exhaustion vulnerability in Microsoft products
The IPv6 implementation in Microsoft Windows 7 and earlier allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2010-4669.
network
low complexity
microsoft CWE-400
7.5
2017-06-22 CVE-2017-0176 Classic Buffer Overflow vulnerability in Microsoft Windows Server 2003 and Windows XP
A buffer overflow in Smart Card authentication code in gpkcsp.dll in Microsoft Windows XP through SP3 and Server 2003 through SP2 allows a remote attacker to execute arbitrary code on the target computer, provided that the computer is joined in a Windows domain and has Remote Desktop Protocol connectivity (or Terminal Services) enabled.
network
high complexity
microsoft CWE-120
8.1
2017-06-15 CVE-2017-8487 Unspecified vulnerability in Microsoft Windows Server 2003 and Windows XP
Windows OLE in Windows XP and Windows Server 2003 allows an attacker to execute code when a victim opens a specially crafted file or program aka "Windows olecnv32.dll Remote Code Execution Vulnerability."
local
low complexity
microsoft
7.8
2017-06-15 CVE-2017-8461 Unspecified vulnerability in Microsoft Windows Server 2003 and Windows XP
Windows RPC with Routing and Remote Access enabled in Windows XP and Windows Server 2003 allows an attacker to execute code on a targeted RPC server which has Routing and Remote Access enabled via a specially crafted application, aka "Windows RPC Remote Code Execution Vulnerability."
local
low complexity
microsoft
7.8
2015-07-14 CVE-2015-2387 Out-of-bounds Write vulnerability in Microsoft products
ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "ATMFD.DLL Memory Corruption Vulnerability."
local
low complexity
microsoft CWE-787
7.8
2014-11-18 CVE-2014-6324 Unspecified vulnerability in Microsoft products
The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability."
network
low complexity
microsoft
8.8
2014-11-11 CVE-2014-4077 Unspecified vulnerability in Microsoft products
Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Office 2007 SP3, when IMJPDCT.EXE (aka IME for Japanese) is installed, allow remote attackers to bypass a sandbox protection mechanism via a crafted PDF document, aka "Microsoft IME (Japanese) Elevation of Privilege Vulnerability," as exploited in the wild in 2014.
local
low complexity
microsoft
7.8
2014-10-15 CVE-2014-4148 Code Injection vulnerability in Microsoft products
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted TrueType font, as exploited in the wild in October 2014, aka "TrueType Font Parsing Remote Code Execution Vulnerability."
network
low complexity
microsoft CWE-94
8.8
2014-10-15 CVE-2014-4113 Unspecified vulnerability in Microsoft products
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
local
low complexity
microsoft
7.8