4 results (0.002 seconds)

CVSS: 5.0EPSS: 7%CPEs: 8EXPL: 2

Microsoft MSN Messenger Service 1.0 through 4.6 allows remote attackers to cause a denial of service (crash) via an invite request that contains hex-encoded spaces (%20) in the Invitation-Cookie field. • https://www.exploit-db.com/exploits/21481 http://online.securityfocus.com/archive/1/274086 http://www.iss.net/security_center/static/9161.php http://www.securityfocus.com/bid/4827 •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

Buffer overflow in Microsoft MSN Messenger Service 1.0 through 4.6 allows remote attackers to cause a denial of service (crash) via a long FN (font) argument in the message header. • http://online.securityfocus.com/archive/1/271130 http://www.securityfocus.com/bid/4675 https://exchange.xforce.ibmcloud.com/vulnerabilities/9014 •

CVSS: 7.5EPSS: 5%CPEs: 5EXPL: 0

Buffer overflow in Microsoft MSN Chat ActiveX Control, as used in MSN Messenger 4.5 and 4.6, and Exchange Instant Messenger 4.5 and 4.6, allows remote attackers to execute arbitrary code via a long ResDLL parameter in the MSNChat OCX. Desbordamiento de búfer en el control ActiveX Microsoft MSN Chat, usado en MSN Messenger 4.5 y 4.6, y Exchange Instant Messenger 4.5 y 4.6, permite a atacantes remotos ejecutar código arbitrario mediante un parámetro ResDLL largo en el OCX MSNChat. • http://marc.info/?l=bugtraq&m=102089960531919&w=2 http://www.cert.org/advisories/CA-2002-13.html http://www.iss.net/security_center/static/9041.php http://www.securityfocus.com/bid/4707 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-022 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Microsoft MSN Messenger allows remote attackers to use Javascript that references an ActiveX object to obtain sensitive information such as display names and web site navigation, and possibly more when the user is connected to certain Microsoft sites (or DNS-spoofed sites). Microsoft MSN Messenger permite a atacantes remotos usar JavaScript que referencia a un objeto ActiveX para obtener información sensible como nombres mostrados y navegación de sitios web, y posiblemente mas cuando el usuario está conectado a ciertos sitios de Microsoft (o sitios con DNS falsificado). • http://online.securityfocus.com/archive/1/254021 http://www.iss.net/security_center/static/8084.php http://www.securityfocus.com/bid/4028 •