{"vulnerability": "cve-2003-0352", "sightings": [{"uuid": "bf9ff3ee-c860-46ab-a436-c9bdc7c46c0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2003-0352", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:37.000000Z"}, {"uuid": "0b6a8263-e71b-484f-af4e-cda08073e34b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2003-0352", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/dcerpc/ms03_026_dcom.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "ee33938d-b492-485e-aa82-6be7c476980e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2003-0352", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:08:05.000000Z"}, {"uuid": "4381e008-53c5-424f-a53d-f5b501625714", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2003-0352", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/16749", "content": "", "creation_timestamp": "2011-01-11T00:00:00.000000Z"}, {"uuid": "f134ade6-a633-444c-a674-462e87ad4471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2003-0352", "type": "exploited", "source": "https://t.me/arpsyndicate/888", "content": "#ExploitObserverAlert\n\nCVE-2003-0352\n\nDESCRIPTION: Exploit Observer has 19 entries related to CVE-2003-0352. Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.\n\nFIRST-EPSS: 0.970560000\nNVD-IS: 6.4\nNVD-ES: 10.0", "creation_timestamp": "2023-12-02T03:20:13.000000Z"}]}