### [CVE-2003-0352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0352) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/WindowsElevation - https://github.com/Ascotbe/Kernelhub - https://github.com/Cruxer8Mech/Idk - https://github.com/fei9747/WindowsElevation - https://github.com/lyshark/Windows-exploits - https://github.com/makoto56/penetration-suite-toolkit - https://github.com/nitishbadole/oscp-note-2 - https://github.com/rmsbpro/rmsbpro - https://github.com/ycdxsb/WindowsPrivilegeEscalation