Page 106 of 637 results (0.009 seconds)

CVSS: 7.6EPSS: 7%CPEs: 5EXPL: 0

Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled. El desbordamiento del búfer en el Windows Shell (usado como escritorio de Windows) permite a atacantes locales y posibles atacantes remotos, la ejecución de código arbitrario mediante un manejador de URL que no ha sido eliminado de una aplicación defectuosamente desinstalada. • http://marc.info/?l=bugtraq&m=101594127017290&w=2 http://www.iss.net/security_center/static/8384.php http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0203&L=ntbugtraq&F=P&S=&P=2404 http://www.securityfocus.com/bid/4248 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-014 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A147 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 96%CPEs: 7EXPL: 0

SMTP service in Microsoft Windows 2000, Windows XP Professional, and Exchange 2000 allows remote attackers to cause a denial of service via a command with a malformed data transfer (BDAT) request. El servicio SMTP en Windows 2000/XP Professional y Exchange 2000 permite a atacantes remotos provocar denegación de servico mediante un comando con una petición transferencia de datos malformada. • http://marc.info/?l=bugtraq&m=101558498401274&w=2 http://www.iss.net/security_center/static/8307.php http://www.securityfocus.com/bid/4204 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-012 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A30 • CWE-669: Incorrect Resource Transfer Between Spheres •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 0

Buffer overflow in telnet server in Windows 2000 and Interix 2.2 allows remote attackers to execute arbitrary code via malformed protocol options. Desbordamiento de buffer en el servicio de telnet en Windows 2000 y Interix 2.2 permite a atacantes remotos ejecutar código arbitrario mediante opciones de protocolo malformadas. • http://www.iss.net/security_center/static/8094.php http://www.securityfocus.com/bid/4061 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-004 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A424 •

CVSS: 10.0EPSS: 2%CPEs: 2EXPL: 0

In Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which allows remote attackers to gain Domain Administrator privileges on the trusting domain by injecting SIDs from untrusted domains into the authorization data that comes from from the trusted domain. En Windows NT y Windows 2000, un dominio valido que recibe información de autorización de un dominio de confianza no verifica que el dominio de confianza es autoritativo para las SIDs listadas, lo que podría permitir a atacantes remotos ganar privilegios de administrador de dominio en el dominio confiante injectando SIDs de dominios no de confianza en los datos de autorización que vienen del dominio de confianza. • http://www.securityfocus.com/bid/3997 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-001 https://exchange.xforce.ibmcloud.com/vulnerabilities/8023 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A159 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A64 •

CVSS: 7.5EPSS: 4%CPEs: 8EXPL: 0

SMTP service in (1) Microsoft Windows 2000 and (2) Internet Mail Connector (IMC) in Exchange Server 5.5 does not properly handle responses to NTLM authentication, which allows remote attackers to perform mail relaying via an SMTP AUTH command using null session credentials. El servicio SMTP enMicrosoft Windows 2000 y Internet Mail Connector (IMC) en Exchange Server 5.5no maneja adecuadamente respuestas a autenticación NTLM, lo que permite a atacantes remotos hacer reenvío de correo mediante el servidor. • http://marc.info/?l=bugtraq&m=101501580409373&w=2 http://www.securityfocus.com/bid/4205 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-011 • CWE-294: Authentication Bypass by Capture-replay •