CVE-2007-1070 – Trend Micro ServerProtect - 'eng50.dll' Remote Stack Overflow
https://notcve.org/view.php?id=CVE-2007-1070
Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote attackers to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, and (3) CMON_ActiveRollback functions in (a) StCommon.dll, and (4) ENG_SetRealTimeScanConfigInfo and (5) ENG_SendEMail functions in (b) eng50.dll. Múltiples desbordamientos de búfer basado en pila en Trend Micro ServerProtect para Windows y EMC 5.58, y para Network Appliance Filer 5.61 y 5.62, permite a atacantes remotos ejecutar código de su elección a través respuestas RPC manipuladas en TmRpcSrv.dll que disparan un desbordamiento de búfer cuando se llama a las funciones (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, y (3) CMON_ActiveRollbackn en (a) StCommon.dll, y (4) ENG_SetRealTimeScanConfigInfo y (5) las funciones ENG_SendEMail en (b) eng50.dll. • https://www.exploit-db.com/exploits/4367 https://www.exploit-db.com/exploits/16827 http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290 http://osvdb.org/33042 http://secunia.com/advisories/24243 http://www.kb.cert.org/vuls/id/349393 http://www.kb.cert.org/vuls/id/466609 http://www.kb.cert.org/vuls/id/630025 http://www.kb.cert.org/vuls/id/730433 http://www.securityfocus.com/archive/1/460686/100/0/threaded http://www.securityfocus. •
CVE-2006-6261 – Quintessential Player 4.50.1.82 - Playlist Denial of Service (PoC)
https://notcve.org/view.php?id=CVE-2006-6261
Buffer overflow in Quintessential Player 4.50.1.82 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) M3u or (2) M3u-8 file; or a (3) crafted PLS file with a long value in the (a) NumberofEntries, (b) Length (aka Length1), (c) Filename (aka File1), (d) Title (aka Title1) field, or other unspecified fields. Desbordamiento de búfer en Quintessential Player 4.50.1.82 y anteriores permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante un fichero (1) M3u o (2) M3u-8 manipulado; o mediante un (3) fichero PLS artesanal con un valor grande en los campos (a) NumberofEntries, (b) Length (también conocido como Length1), (c) Filename (aka File1), (d) Title (también conocido como Title1), u otros campos no especificados. • https://www.exploit-db.com/exploits/2860 http://www.securityfocus.com/bid/21331 https://exchange.xforce.ibmcloud.com/vulnerabilities/30559 •
CVE-2006-5614 – Microsoft Windows - NAT Helper Components Remote Denial of Service
https://notcve.org/view.php?id=CVE-2006-5614
Microsoft Windows NAT Helper Components (ipnathlp.dll) on Windows XP SP2, when Internet Connection Sharing is enabled, allows remote attackers to cause a denial of service (svchost.exe crash) via a malformed DNS query, which results in a null pointer dereference. Microsoft Windows NAT Helper Components (ipnathlp.dll) sobre Windows XP SP2, cuando Internet Connection Sharing está activado, permite a un atacante remoto provocar denegación de servicio (caida svchost.exe) a través de una consulta DNS mal formada, el cual termina en un puntero de referencia nulo. • https://www.exploit-db.com/exploits/2682 https://www.exploit-db.com/exploits/2672 http://research.eeye.com/html/alerts/zeroday/20061028.html http://secunia.com/advisories/22592 http://securitytracker.com/id?1017133 http://www.osvdb.org/30096 http://www.securityfocus.com/bid/20804 http://www.vupen.com/english/advisories/2006/4248 https://exchange.xforce.ibmcloud.com/vulnerabilities/29917 •
CVE-2006-2379 – Microsoft Windows - TCP/IP Protocol Driver Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-2379
Buffer overflow in the TCP/IP Protocol driver in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote attackers to execute arbitrary code via unknown vectors related to IP source routing. • https://www.exploit-db.com/exploits/1967 http://secunia.com/advisories/20639 http://securitytracker.com/id?1016290 http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/46702 http://www.kb.cert.org/vuls/id/722753 http://www.osvdb.org/26433 http://www.securityfocus.com/archive/1/438482/100/0/threaded http://www.securityfocus.com/archive/1/438609/100/0/threaded http://www.securityfocus.com/bid/18374 http://www.us-cert.gov/cas/techalerts/TA06-164A.html htt • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-1184
https://notcve.org/view.php?id=CVE-2006-1184
Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0, 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to cause a denial of service (crash) via a BuildContextW request with a large (1) UuidString or (2) GuidIn of a certain length, which causes an out-of-range memory access, aka the MSDTC Denial of Service Vulnerability. NOTE: this is a variant of CVE-2005-2119. • http://secunia.com/advisories/20000 http://securityreason.com/securityalert/864 http://securitytracker.com/id?1016047 http://www.eeye.com/html/research/advisories/AD20060509b.html http://www.osvdb.org/25336 http://www.securityfocus.com/archive/1/433425/100/0/threaded http://www.securityfocus.com/bid/17905 http://www.vupen.com/english/advisories/2006/1742 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018 https://exchange.xforce.ibmcloud.com/vulnerabilities& •