Page 12 of 317 results (0.005 seconds)

CVSS: 7.8EPSS: 89%CPEs: 38EXPL: 3

11 Feb 2004 — Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings. Múltiples desbordamientos de enteros en la librería ASN.1 de Microsoft (MSASN1.DLL), usada en LSASS.EXE, CRYPT32.DLL, y otros ejecutables de Mic... • https://www.exploit-db.com/exploits/153 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2003 — ProxyView has a default administrator password of Administrator for Embedded Windows NT, which allows remote attackers to gain access. • http://securityreason.com/securityalert/3228 • CWE-16: Configuration •

CVSS: 7.8EPSS: 3%CPEs: 1EXPL: 2

31 Dec 2003 — Buffer overflow in cmd.exe in Windows NT 4.0 may allow local users to execute arbitrary code via a long pathname argument to the cd command. • https://www.exploit-db.com/exploits/22245 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 0%CPEs: 34EXPL: 0

31 Dec 2003 — BEA WebLogic Express and WebLogic Server 7.0 and 7.0.0.1, stores passwords in plaintext when a keystore is used to store a private key or trust certificate authorities, which allows local users to gain access. • http://dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-25.jsp •

CVSS: 5.3EPSS: 1%CPEs: 7EXPL: 2

31 Dec 2003 — The default configuration of ColdFusion MX has the "Enable Robust Exception Information" option selected, which allows remote attackers to obtain the full path of the web server via a direct request to CFIDE/probe.cfm, which leaks the path in an error message. • https://www.exploit-db.com/exploits/22544 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 3%CPEs: 49EXPL: 2

17 Oct 2003 — Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application. Desbordamiento de búfer en User32.dll en Windows NT a Server 2003 permite a usaurios locales ejcutar código arbitrario mediante mensajes grandes a controles: LB_DIR a ListBox o CB_DIR a ComboBox; en una operación privilegiada. • https://www.exploit-db.com/exploits/23255 •

CVSS: 9.8EPSS: 35%CPEs: 49EXPL: 0

17 Oct 2003 — The Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers to execute arbitrary code without user approval. La capacidad Authenticode en Microsoft Windows NT hasta Server 2003 no pide al usuario confirmación para descargar e instalar controles ActiveX cuanto el sistema está bajo de memoria, lo que podría permitir a atacantes remotos ejecutar código arbitrario si... • http://www.cert.org/advisories/CA-2003-27.html •

CVSS: 9.8EPSS: 51%CPEs: 48EXPL: 0

17 Oct 2003 — Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL. Desbordamiento de búfer en la pila en el sistema PCHealht en el Centro de Ayuda y Soporte de Windows XP y Windows 2003 Server permite a atacantes remotos ejecutar código arbitrario mediante una petición larga en la URL HCP. • http://marc.info/?l=bugtraq&m=106631908105696&w=2 •

CVSS: 9.8EPSS: 81%CPEs: 48EXPL: 5

17 Oct 2003 — The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack. El servicio de mensajería de Windows NT a Server 2003 no verifica adecuadamente la longitud del mensaje, lo que permite a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamiento de búfer. • https://www.exploit-db.com/exploits/385 •

CVSS: 5.9EPSS: 52%CPEs: 10EXPL: 0

15 Oct 2003 — A multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities. Una condición de carrera entre hebras de ejecución ... • http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011870.html • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •