CVE-2003-0711
https://notcve.org/view.php?id=CVE-2003-0711
Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL. Desbordamiento de búfer en la pila en el sistema PCHealht en el Centro de Ayuda y Soporte de Windows XP y Windows 2003 Server permite a atacantes remotos ejecutar código arbitrario mediante una petición larga en la URL HCP. • http://marc.info/?l=bugtraq&m=106631908105696&w=2 http://marc.info/?l=ntbugtraq&m=106632194809632&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/467036 http://www.ngssoftware.com/advisories/ms-pchealth.txt http://www.securityfocus.com/bid/8828 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-044 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A217 https://oval.cisecurity •
CVE-2003-0469 – Microsoft Windows XP/2000/NT 4.0 - HTML Converter HR Align Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0469
Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag. Desbordamiento de búfer en el Convertidor HTML (HTML32.cnv) de varios sistemas operativos Windows, permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario mediante una operación de cortar-y-pegar, como se ha demostrado en Internet Explorer 5.0 usando un arguemento "align" larga en una etiqueta HR. • https://www.exploit-db.com/exploits/22824 http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006155.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-June/006067.html http://marc.info/?l=bugtraq&m=105639925122961&w=2 http://www.cert.org/advisories/CA-2003-14.html http://www.kb.cert.org/vuls/id/823260 http://www.securityfocus.com/bid/8016 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-023 •
CVE-2003-0010
https://notcve.org/view.php?id=CVE-2003-0010
Integer overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a large array index value that enables a heap-based buffer overflow attack. Desbordamiento de enteros en JsArrayFunctionHeapSort usado en el Motor de script Windows de JScript (JScript.dll) en varios sistemas operativos Windows permite a atacantes remotos ejecutar código arbitrario mediante una página web maliciosao un correo electrónico HTML que usa un valor de índice de array largo que permite un ataque de desbordamiento de búfer basado en el montón (heap). • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0139.html http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=26 http://marc.info/?l=bugtraq&m=104812108307645&w=2 http://www.securityfocus.com/bid/7146 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-008 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A134 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A200 https:/ •
CVE-2003-0009 – Microsoft Windows XP/ME - Help and Support Center Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0009
Cross-site scripting (XSS) vulnerability in Help and Support Center for Microsoft Windows Me allows remote attackers to execute arbitrary script in the Local Computer security context via an hcp:// URL with the malicious script in the topic parameter. Vulnerabilidad de scripts en sitios cruzados (XSS) en el Centro de Ayuda y Soporte de Windows Me permite a hackers remotos ejecutar script arbitrario en el contexto de seguridad del 'Ordenador Local' mediante una URL hcp:// con el código malicioso en el parámetro topic • https://www.exploit-db.com/exploits/22289 http://marc.info/?l=bugtraq&m=104636383018686&w=2 http://www.ciac.org/ciac/bulletins/n-047.shtml http://www.iss.net/security_center/static/11425.php http://www.kb.cert.org/vuls/id/489721 http://www.osvdb.org/6074 http://www.securityfocus.com/bid/6966 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-006 •
CVE-2002-1257
https://notcve.org/view.php?id=CVE-2002-1257
Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to execute arbitrary code by including a Java applet that invokes COM (Component Object Model) objects in a web site or an HTML mail. La Máquina Virtual de Microsoft (VM) hasta 5.0.3805 inclusive permite a atacantes remotos ejecutar código arbitrario incluyendo un applet de Java que invoca objetos COM (Component Object Model) en un sitio web o en un correo HTML. • http://www.securityfocus.com/bid/6371 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 •