Page 14 of 79 results (0.011 seconds)

CVSS: 10.0EPSS: 2%CPEs: 54EXPL: 0

Heap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vulnerability than CVE-2003-1041. Vulnerabilidad basada en el montón en el programa HtmlHelp (hh.exe) en ayuda HTML de Microsoft Windows 98, Me, NT, 4.0, 2000, XP y Server 2003 permite a atacantes remotos ejecutar órdenes de su elección mediante un fichero .CHML con un campo de longitud largo, una vulnerabilidad distinta de CAN-2003-1041. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023919.html http://www.kb.cert.org/vuls/id/920060 http://www.us-cert.gov/cas/techalerts/TA04-196A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023 https://exchange.xforce.ibmcloud.com/vulnerabilities/16586 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1503 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1530 https:/ •

CVSS: 5.0EPSS: 29%CPEs: 28EXPL: 0

IDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet. El interfaz de programación de aplicación (API) IDirectPlay de Microsoft DirectPlay 7.0a a 9.0b, usado en Windows Server 2003 y anteriores, permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante un paquete malformado. • http://secunia.com/advisories/11802 http://www.osvdb.org/6742 http://www.securityfocus.com/bid/10487 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-016 https://exchange.xforce.ibmcloud.com/vulnerabilities/16306 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1027 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2190 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Ad •

CVSS: 5.1EPSS: 95%CPEs: 13EXPL: 1

Help and Support Center in Microsoft Windows XP and Windows Server 2003 SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code, as demonstrated using certain hcp:// URLs that access the DVD Upgrade capability (dvdupgrd.htm). El Centro de Ayuda y Soporte en Windows XP y Windows Server 2003 SP1 no valida adecuadamente URLs HCP, lo que permite a atancantes remotos ejecutar código arbitrario, como se ha demostrado usando ciertas URLs hcp:// que acceden a la capacidad de mejora de DVD (dvdupgrd.htm) • http://marc.info/?l=bugtraq&m=108437759930820&w=2 http://marc.info/?l=full-disclosure&m=108430407801825&w=2 http://www.exploitlabs.com/files/advisories/EXPL-A-2004-001-helpctr.txt http://www.kb.cert.org/vuls/id/484814 http://www.securityfocus.com/bid/10321 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-015 https://exchange.xforce.ibmcloud.com/vulnerabilities/16095 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10 •

CVSS: 9.3EPSS: 96%CPEs: 34EXPL: 0

The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code. El Servicio de Nombres de Internet de Windows (WINS) en Microsoft Windows Server 2003, y posiblemente Windows NT y Server 2000 no valida adecuadamente la longitud de ciertos paquetes, lo que permite a ciertos paquetes causar una denegación de servicio y posiblemente ejecutar código arbitrario. • http://www.ciac.org/ciac/bulletins/o-077.shtml http://www.kb.cert.org/vuls/id/445214 http://www.osvdb.org/3903 http://www.securityfocus.com/bid/9624 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-006 https://exchange.xforce.ibmcloud.com/vulnerabilities/15037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A704 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A800 https://oval.c • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 97%CPEs: 38EXPL: 3

Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings. Múltiples desbordamientos de enteros en la librería ASN.1 de Microsoft (MSASN1.DLL), usada en LSASS.EXE, CRYPT32.DLL, y otros ejecutables de Microsoft y librerías en Windows NT/2000/XP, permite a atacantes remotos ejecutar código arbitrario mediante codificaciones ASN.1 BER con campos de longitud muy largos que hace que se sobreescriban datos arbitrarios del montón. • https://www.exploit-db.com/exploits/153 https://www.exploit-db.com/exploits/16377 https://www.exploit-db.com/exploits/3022 http://marc.info/?l=bugtraq&m=107643836125615&w=2 http://marc.info/?l=bugtraq&m=107643892224825&w=2 http://marc.info/?l=ntbugtraq&m=107650972617367&w=2 http://marc.info/?l=ntbugtraq&m=107650972723080&w=2 http://www.kb.cert.org/vuls/id/216324 http://www.kb.cert.org/vuls/id/583108 http://www.us-cert.gov/cas/techalerts/TA04 •