2 results (0.004 seconds)

CVSS: 9.3EPSS: 56%CPEs: 11EXPL: 0

SBE.dll in the Stream Buffer Engine in Windows Media Player and Windows Media Center in Microsoft Windows XP SP2 and SP3, Windows XP Media Center Edition 2005 SP3, Windows Vista SP1 and SP2, Windows 7 Gold and SP1, and Windows Media Center TV Pack for Windows Vista does not properly parse Digital Video Recording (.dvr-ms) files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DVR-MS Vulnerability." SBE.dll de Stream Buffer Engine de Windows Media Player y Windows Media Center de Microsoft Windows XP SP2 y SP3, Windows XP Media Center Edition 2005 SP3, Windows Vista SP1 y SP2, Windows 7 Gold y SP1, y Windows Media Center TV Pack para Windows Vista no procesa apropiadamente ficheros Digital Video Recording (.dvr-ms), lo que permite a atacantes remotos ejecutar código arbitrario a través de un fichero modificado. También coocido como "vulnerabilidad DVR-MS". • http://osvdb.org/71016 http://secunia.com/advisories/43626 http://www.securityfocus.com/bid/46680 http://www.securitytracker.com/id?1025169 http://www.us-cert.gov/cas/techalerts/TA11-067A.html http://www.vupen.com/english/advisories/2011/0615 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-015 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12281 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 19%CPEs: 67EXPL: 1

The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang. • https://www.exploit-db.com/exploits/721 http://marc.info/?l=bugtraq&m=110382854111833&w=2 http://www.kb.cert.org/vuls/id/177584 http://www.kb.cert.org/vuls/id/697136 http://www.us-cert.gov/cas/techalerts/TA05-012A.html http://www.xfocus.net/flashsky/icoExp https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002 https://exchange.xforce.ibmcloud.com/vulnerabilities/18667 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.o •