Page 13 of 317 results (0.007 seconds)

CVSS: 10.0EPSS: 61%CPEs: 48EXPL: 0

12 Sep 2003 — Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed RPC request with a long filename parameter, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0715. Desbordamiento de búfer en el interfaz DCOM (Distributed Component Object Model) en el servicio RPCSS permite a atacantes remotos la ejecución arbitraria de código mediante una petición RPC mal construida con un par... • http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0100.html •

CVSS: 10.0EPSS: 61%CPEs: 48EXPL: 0

12 Sep 2003 — Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528. Desbordamiento de búfer basado en el montón en el interfaz DCOM (Distributed Component Object Model) del servicio RPCSS de Windows NT/2000/XP/2003 permite a atacantes remotos ejecutar c... • http://marc.info/?l=bugtraq&m=106322856608909&w=2 •

CVSS: 7.5EPSS: 16%CPEs: 46EXPL: 0

04 Sep 2003 — The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information. • http://www.kb.cert.org/vuls/id/989932 •

CVSS: 7.5EPSS: 4%CPEs: 23EXPL: 0

25 Jul 2003 — The getCanonicalPath function in Windows NT 4.0 may free memory that it does not own and cause heap corruption, which allows attackers to cause a denial of service (crash) via requests that cause a long file name to be passed to getCanonicalPath, as demonstrated on the IBM JVM using a long string to the java.io.getCanonicalPath Java method. La función getCanonicalPath en Windows NT 4.0 puede liberar memoria que no posee y causar una corrupción en el montículo, lo que permite a atacantes causar una denegació... • http://www.atstake.com/research/advisories/2003/a072303-1.txt •

CVSS: 9.8EPSS: 91%CPEs: 48EXPL: 4

17 Jul 2003 — Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms. Desbordamiento de búfer en una cierta interfaz RPC DCOM en Microsoft Windows NT4, 2000, XP y 2003 permite a atacantes remotos ejecutar código arbitrario mediante un mensaje malformado. • https://www.exploit-db.com/exploits/16749 •

CVSS: 9.8EPSS: 46%CPEs: 42EXPL: 0

10 Jul 2003 — Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required. Desbordamiento de búfer en el Bloque de Mensajes de Servidor (SMB) en Microsoft Windows XP, 2000 y NT permite a atacantes remotos causar la Denegación de Servicios (DoS) y posiblemente ejecutar código arbitrario mediante un paquete SMB que especifica una longitud de búfe... • http://secunia.com/advisories/9225 •

CVSS: 9.8EPSS: 51%CPEs: 10EXPL: 1

28 Jun 2003 — Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag. Desbordamiento de búfer en el Convertidor HTML (HTML32.cnv) de varios sistemas operativos Windows, permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario me... • https://www.exploit-db.com/exploits/22824 •

CVSS: 9.8EPSS: 48%CPEs: 2EXPL: 1

30 May 2003 — The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request. La librería nsisslog.dll de la extensión ISAPI de Microsoft Winodws Media Services en Windows NT 4.0 y 2000 permite que atacante remotos provoquen una denegación de servicio en el Internet ... • https://www.exploit-db.com/exploits/56 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 3%CPEs: 45EXPL: 0

26 Apr 2003 — Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger. Desbordamiento de búfer en el Kernel de Windows permite a usuarios locales ganar privilegios haciendo que ciertos mensajes de error sean pasados a un depurador. • http://www.kb.cert.org/vuls/id/446338 •

CVSS: 7.5EPSS: 58%CPEs: 45EXPL: 5

26 Mar 2003 — The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference. La pila DCE-RPC en Windows 2000 y otros sistemas operativos permite a atacantes remotos causar una denegación de servicio (desactivar el servico RCP) mediante un paquete malformado al puerto TCP 135, que dispara una desreferencia a un puntero nulo. • https://www.exploit-db.com/exploits/21951 •