Buffer overflow in cmd.exe in Windows NT 4.0 may allow local users to execute arbitrary code via a long pathname argument to the cd command.
Source: MITRE
Max CVSS
7.2
EPSS Score
0.05%
Published
2003-12-31
Updated
2017-07-29
The showHelp() function in Microsoft Internet Explorer 5.01, 5.5, and 6.0 supports certain types of pluggable protocols that allow remote attackers to bypass the cross-domain security model and execute arbitrary code, aka "Improper Cross Domain Security Validation with ShowHelp functionality."
Source: MITRE
Max CVSS
7.5
EPSS Score
9.22%
Published
2003-02-19
Updated
2021-07-23
"Shatter" vulnerability in CommCtl32.dll in Windows XP may allow local users to execute arbitrary code by sending (1) BCM_GETTEXTMARGIN or (2) BCM_SETTEXTMARGIN button control messages to privileged applications.
Source: MITRE
Max CVSS
4.6
EPSS Score
0.04%
Published
2003-11-17
Updated
2017-07-11

CVE-2003-0822

Public exploit
Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
Source: MITRE
Max CVSS
7.5
EPSS Score
97.10%
Published
2003-12-15
Updated
2019-04-30
Microsoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.
Source: MITRE
Max CVSS
7.5
EPSS Score
28.09%
Published
2003-12-15
Updated
2018-10-12
Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.
Source: MITRE
Max CVSS
7.5
EPSS Score
10.46%
Published
2003-12-15
Updated
2018-10-12

CVE-2003-0812

Public exploit
Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API.
Source: MITRE
Max CVSS
7.5
EPSS Score
96.90%
Published
2003-12-15
Updated
2019-04-30
Internet Explorer 5.01 through 6.0 does not properly handle object tags returned from a Web server during XML data binding, which allows remote attackers to execute arbitrary code via an HTML e-mail message or web page.
Source: MITRE
Max CVSS
7.5
EPSS Score
94.30%
Published
2003-11-17
Updated
2021-07-23
The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
Source: MITRE
Max CVSS
7.5
EPSS Score
97.11%
Published
2003-11-17
Updated
2019-04-30
Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528.
Source: MITRE
Max CVSS
10.0
EPSS Score
70.33%
Published
2003-09-17
Updated
2019-04-30
Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL.
Source: MITRE
Max CVSS
7.5
EPSS Score
55.76%
Published
2003-11-17
Updated
2019-04-30
Buffer overflow in Internet Explorer 6 SP1 for certain languages that support double-byte encodings (e.g., Japanese) allows remote attackers to execute arbitrary code via the Type property of an Object tag, a variant of CVE-2003-0344.
Source: MITRE
Max CVSS
7.5
EPSS Score
7.72%
Published
2003-08-27
Updated
2021-07-23
Buffer overflow in Microsoft Wordperfect Converter allows remote attackers to execute arbitrary code via modified data offset and data size parameters in a Corel WordPerfect file.
Source: MITRE
Max CVSS
7.5
EPSS Score
9.29%
Published
2003-10-20
Updated
2018-10-12
Buffer overflow in the ActiveX control for Microsoft Access Snapshot Viewer for Access 97, 2000, and 2002 allows remote attackers to execute arbitrary code via long parameters to the control.
Source: MITRE
Max CVSS
7.5
EPSS Score
7.72%
Published
2003-10-20
Updated
2018-10-12
Buffer overflow in Troubleshooter ActiveX Control (Tshoot.ocx) in Microsoft Windows 2000 SP4 and earlier allows remote attackers to execute arbitrary code via an HTML document with a long argument to the RunQuery2 method.
Source: MITRE
Max CVSS
9.3
EPSS Score
96.60%
Published
2003-11-17
Updated
2019-04-30
The Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers to execute arbitrary code without user approval.
Source: MITRE
Max CVSS
7.5
EPSS Score
10.39%
Published
2003-11-17
Updated
2019-04-30
Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application.
Source: MITRE
Max CVSS
7.2
EPSS Score
0.06%
Published
2003-11-17
Updated
2019-04-30
Internet Explorer 5.01 SP3 through 6.0 SP1 does not properly determine object types that are returned by web servers, which could allow remote attackers to execute arbitrary code via an object tag with a data parameter to a malicious file hosted on a server that returns an unsafe Content-Type, aka the "Object Type" vulnerability.
Source: MITRE
Max CVSS
7.5
EPSS Score
32.96%
Published
2003-08-27
Updated
2021-07-23
Buffer overflow in the BR549.DLL ActiveX control for Internet Explorer 5.01 SP3 through 6.0 SP1 allows remote attackers to execute arbitrary code.
Source: MITRE
Max CVSS
7.5
EPSS Score
11.21%
Published
2003-08-27
Updated
2021-07-23
Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0715.
Source: MITRE
Max CVSS
10.0
EPSS Score
69.64%
Published
2003-09-17
Updated
2019-04-30
Stack-based buffer overflow in Active Directory in Windows 2000 before SP4 allows remote attackers to cause a denial of service (reboot) and possibly execute arbitrary code via an LDAP version 3 search request with a large number of (1) "AND," (2) "OR," and possibly other statements, which causes LSASS.EXE to crash.
Source: MITRE
Max CVSS
7.5
EPSS Score
5.99%
Published
2003-08-07
Updated
2016-10-18
Buffer overflow in the ShellExecute API function of SHELL32.DLL in Windows 2000 before SP4 may allow attackers to cause a denial of service or execute arbitrary code via a long third argument.
Source: MITRE
Max CVSS
7.5
EPSS Score
1.68%
Published
2003-08-07
Updated
2016-10-18
Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag.
Source: MITRE
Max CVSS
7.5
EPSS Score
15.62%
Published
2003-08-07
Updated
2018-10-12
Buffer overflow in a component of SQL-DMO for Microsoft Data Access Components (MDAC) 2.5 through 2.7 allows remote attackers to execute arbitrary code via a long response to a broadcast request to UDP port 1434.
Source: MITRE
Max CVSS
7.5
EPSS Score
11.31%
Published
2003-08-27
Updated
2018-10-12

CVE-2003-0352

Public exploit
Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
Source: MITRE
Max CVSS
7.5
EPSS Score
97.08%
Published
2003-08-18
Updated
2019-04-30
44 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!