Page 11 of 79 results (0.006 seconds)

CVSS: 7.5EPSS: 49%CPEs: 25EXPL: 0

The OLE component in Windows 98, 2000, XP, and Server 2003, and Exchange Server 5.0 through 2003, does not properly validate the lengths of messages for certain OLE data, which allows remote attackers to execute arbitrary code, aka the "Input Validation Vulnerability." • http://www.kb.cert.org/vuls/id/927889 http://www.us-cert.gov/cas/techalerts/TA05-039A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-012 https://exchange.xforce.ibmcloud.com/vulnerabilities/19109 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1180 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2917 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A35 •

CVSS: 7.5EPSS: 79%CPEs: 24EXPL: 0

The Hyperlink Object Library for Windows 98, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a crafted link that triggers an "unchecked buffer" in the library, possibly due to a buffer overflow. La biblioteca de objetos Hyperlink para Windows 98, 2000, XP y Server 2003 permite a los atacantes remotos ejecutar código arbitrario a través de un enlace diseñado que activa un "buffer no controlado" en la biblioteca, posiblemente debido a un desbordamiento del buffer. • http://secunia.com/advisories/14195 http://securitytracker.com/id?1013119 http://www.kb.cert.org/vuls/id/820427 http://www.securityfocus.com/bid/12479 http://www.us-cert.gov/cas/techalerts/TA05-039A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-015 https://exchange.xforce.ibmcloud.com/vulnerabilities/19110 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2570 https://oval.cisecurity.org/repository/search/definition •

CVSS: 7.5EPSS: 90%CPEs: 6EXPL: 1

The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability." • https://www.exploit-db.com/exploits/733 http://secunia.com/advisories/13466 http://securitytracker.com/id?1012517 http://www.ciac.org/ciac/bulletins/p-054.shtml http://www.kb.cert.org/vuls/id/378160 http://www.osvdb.org/12370 http://www.securityfocus.com/bid/11922 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-045 https://exchange.xforce.ibmcloud.com/vulnerabilities/18259 •

CVSS: 5.1EPSS: 29%CPEs: 58EXPL: 3

Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file. El desbordamiento de búfer basado en memoria dinámica (heap) en winhlp32.exe en Windows NT, Windows 2000 a SP4, Windows XP a SP2 y Windows 2003 permite a los atacantes remotos ejecutar código arbitrario a través de un archivo.hlp diseñado. • https://www.exploit-db.com/exploits/25049 http://marc.info/?l=bugtraq&m=110383690219440&w=2 http://www.securityfocus.com/bid/12092 http://www.xfocus.net/flashsky/icoExp https://exchange.xforce.ibmcloud.com/vulnerabilities/18678 •

CVSS: 5.0EPSS: 5%CPEs: 56EXPL: 1

Integer underflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a malformed .hlp file, which leads to a heap-based buffer overflow. • http://marc.info/?l=bugtraq&m=110383690219440&w=2 http://www.securityfocus.com/bid/12091 http://www.xfocus.net/flashsky/icoExp https://exchange.xforce.ibmcloud.com/vulnerabilities/18678 •