Page 12 of 214 results (0.005 seconds)

CVSS: 7.2EPSS: 2%CPEs: 2EXPL: 0

The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code. El componente del subsistema de la Máquina Virtual DOS (VDM) en Windows NT 4.0 y Windows 2000 no valida adecuadamente estructuras de sistema, lo que permite a usuarios locales acceder a memoria protegida del kernel y ejecutar código de su elección. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020070.html http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.eeye.com/html/Research/Advisories/AD20040413E.html http://www.kb.cert.org/vuls/id/783748 http://www.securityfocus.com/bid/10117 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com/vulnerabilities/15714 https://oval.cisecurity.or •

CVSS: 2.6EPSS: 1%CPEs: 7EXPL: 0

The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability." El interfaz RPC DCOM de Microsoft Windows NT 4.0, 2000, XP y Server 2003 permite a atacantes remotos causar comunicaciones de red mediante una llamada de "alterar contexto" conteniendo datos adicionales, también conocida como "Vulnerabilidad de Identidad de Objeto". • http://secunia.com/advisories/11065 http://www.ciac.org/ciac/bulletins/o-115.shtml http://www.kb.cert.org/vuls/id/212892 http://www.securityfocus.com/bid/10121 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012 https://exchange.xforce.ibmcloud.com/vulnerabilities/15711 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1041 https://oval.cisecurity.org/repository/ •

CVSS: 9.3EPSS: 96%CPEs: 34EXPL: 0

The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code. El Servicio de Nombres de Internet de Windows (WINS) en Microsoft Windows Server 2003, y posiblemente Windows NT y Server 2000 no valida adecuadamente la longitud de ciertos paquetes, lo que permite a ciertos paquetes causar una denegación de servicio y posiblemente ejecutar código arbitrario. • http://www.ciac.org/ciac/bulletins/o-077.shtml http://www.kb.cert.org/vuls/id/445214 http://www.osvdb.org/3903 http://www.securityfocus.com/bid/9624 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-006 https://exchange.xforce.ibmcloud.com/vulnerabilities/15037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A704 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A800 https://oval.c • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 97%CPEs: 38EXPL: 3

Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings. Múltiples desbordamientos de enteros en la librería ASN.1 de Microsoft (MSASN1.DLL), usada en LSASS.EXE, CRYPT32.DLL, y otros ejecutables de Microsoft y librerías en Windows NT/2000/XP, permite a atacantes remotos ejecutar código arbitrario mediante codificaciones ASN.1 BER con campos de longitud muy largos que hace que se sobreescriban datos arbitrarios del montón. • https://www.exploit-db.com/exploits/153 https://www.exploit-db.com/exploits/16377 https://www.exploit-db.com/exploits/3022 http://marc.info/?l=bugtraq&m=107643836125615&w=2 http://marc.info/?l=bugtraq&m=107643892224825&w=2 http://marc.info/?l=ntbugtraq&m=107650972617367&w=2 http://marc.info/?l=ntbugtraq&m=107650972723080&w=2 http://www.kb.cert.org/vuls/id/216324 http://www.kb.cert.org/vuls/id/583108 http://www.us-cert.gov/cas/techalerts/TA04 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

Buffer overflow in cmd.exe in Windows NT 4.0 may allow local users to execute arbitrary code via a long pathname argument to the cd command. • https://www.exploit-db.com/exploits/22245 http://securityreason.com/securityalert/3251 http://www.securityfocus.com/archive/1/311359 http://www.securityfocus.com/bid/6829 https://exchange.xforce.ibmcloud.com/vulnerabilities/11329 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •