Page 10 of 109 results (0.022 seconds)

CVSS: 9.3EPSS: 35%CPEs: 6EXPL: 0

13 Feb 2007 — The MFC component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1 and Visual Studio .NET 2000, 2002 SP1, 2003, and 2003 SP1 allows user-assisted remote attackers to execute arbitrary code via an RTF file with a malformed OLE object that triggers memory corruption. NOTE: this might be due to a stack-based buffer overflow in the AfxOleSetEditMenu function in MFC42u.dll. El componente MFC en Microsoft Windows 2000 SP4, XP SP2 y 2003 SP1 y Visual Studio .NET 2000, 2002 SP1, 2003 y 2003 SP1 permite a atacant... • http://secunia.com/advisories/24150 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.3EPSS: 68%CPEs: 10EXPL: 0

13 Feb 2007 — The RichEdit component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1; Office 2000 SP3, XP SP3, 2003 SP2, and Office 2004 for Mac; and Learning Essentials for Microsoft Office 1.0, 1.1, and 1.5 allows user-assisted remote attackers to execute arbitrary code via a malformed OLE object in an RTF file, which triggers memory corruption. El componente RichEdit en Microsoft Windows 2000 SP4, XP SP2, y 2003 SP1; Office 2000 SP3, XP SP3, 2003 SP2, y Office 2004 para Mac; y Learning Essentials para Microsoft Of... • http://secunia.com/advisories/24152 •

CVSS: 6.5EPSS: 31%CPEs: 1EXPL: 0

18 Dec 2006 — projectserver/logon/pdsrequest.asp in Microsoft Project Server 2003 allows remote authenticated users to obtain the MSProjectUser password for a SQL database via a GetInitializationData request, which includes the information in the UserName and Password tags of the response. projectserver/logon/pdsrequest.asp en Microsoft Project Server 2003 permite a atacantes remotos autenticados la obtención de la contraseña de MSProjectUser para una base de datos SQL a través de una petición GetInitializationData, que ... • http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051316.html •

CVSS: 9.3EPSS: 65%CPEs: 13EXPL: 4

19 Sep 2006 — Stack-based buffer overflow in the Vector Graphics Rendering engine (vgx.dll), as used in Microsoft Outlook and Internet Explorer 6.0 on Windows XP SP2, and possibly other versions, allows remote attackers to execute arbitrary code via a Vector Markup Language (VML) file with a long fill parameter within a rect tag. Desbordamiento de búfer basado en el motor Vector Graphics Rendering (vgx.dll), tal y como se usa en Microsoft Outlook e Internet Explorer 6.0 en Windows XP SP2 y posiblemente otras versiones pe... • https://www.exploit-db.com/exploits/2425 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 87%CPEs: 3EXPL: 1

09 May 2006 — Unspecified vulnerability in Microsoft Exchange allows remote attackers to execute arbitrary code via e-mail messages with crafted (1) vCal or (2) iCal Calendar properties. • https://packetstorm.news/files/id/180581 •

CVSS: 7.8EPSS: 0%CPEs: 25EXPL: 0

14 Feb 2006 — The ShellAbout API call in Korean Input Method Editor (IME) in Korean versions of Microsoft Windows XP SP1 and SP2, Windows Server 2003 up to SP1, and Office 2003, allows local users to gain privileges by launching the "shell about dialog box" and clicking the "End-User License Agreement" link, which executes Notepad with the privileges of the program that displays the about box. • http://secunia.com/advisories/18859 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.8EPSS: 56%CPEs: 16EXPL: 0

10 Jan 2006 — Unspecified vulnerability in Microsoft Outlook 2000 through 2003, Exchange 5.0 Server SP2 and 5.5 SP4, Exchange 2000 SP3, and Office allows remote attackers to execute arbitrary code via an e-mail message with a crafted Transport Neutral Encapsulation Format (TNEF) MIME attachment, related to message length validation. • http://secunia.com/advisories/18368 •

CVSS: 9.8EPSS: 76%CPEs: 2EXPL: 1

13 Apr 2005 — Heap-based buffer overflow in the SvrAppendReceivedChunk function in xlsasink.dll in the SMTP service of Exchange Server 2000 and 2003 allows remote attackers to execute arbitrary code via a crafted X-LINK2STATE extended verb request to the SMTP port. • https://www.exploit-db.com/exploits/947 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 9%CPEs: 2EXPL: 0

13 Mar 2005 — Stack consumption vulnerability in Microsoft Exchange Server 2003 SP1 allows users to cause a denial of service (hang) by deleting or moving a folder with deeply nested subfolders, which causes Microsoft Exchange Information Store service (Store.exe) to hang as a result of a large number of recursive calls. • http://secunia.com/advisories/14543 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.1EPSS: 75%CPEs: 2EXPL: 3

15 Feb 2005 — Microsoft Outlook Web Access (OWA), when used with Exchange, allows remote attackers to redirect users to arbitrary URLs for login via a link to the owalogon.asp application. Microsoft Outlook Web Access (OWA), cuando se usa con Exchange, permite a atacantes remotos redirigir usuario a URLs de inicio de sesión de su elección mediante un enlace a la aplicación owalogin.asp. • https://www.exploit-db.com/exploits/25084 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •