Page 14 of 317 results (0.003 seconds)

CVSS: 8.8EPSS: 18%CPEs: 46EXPL: 0

21 Mar 2003 — Integer overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a large array index value that enables a heap-based buffer overflow attack. Desbordamiento de enteros en JsArrayFunctionHeapSort usado en el Motor de script Windows de JScript (JScript.dll) en varios sistemas operativos Windows permite a atacantes remotos ejecutar có... • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0139.html •

CVSS: 7.8EPSS: 21%CPEs: 45EXPL: 2

07 Feb 2003 — Buffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information. Desbordamiento de búfer en el servicio Localizador de Windows NT 4.0, Windows NT 4.0 Terminal server Edition, Windows 2000, y Windows XP permite a usuarios locales ejecutar código arbitrario mediante una llamada RPC al servicio conteniendo cierta infor... • https://www.exploit-db.com/exploits/5 •

CVSS: 7.5EPSS: 40%CPEs: 26EXPL: 3

31 Dec 2002 — Microsoft Windows 2000 allows remote attackers to cause a denial of service (memory consumption) by sending a flood of empty TCP/IP packets with the ACK and FIN bits set to the NetBIOS port (TCP/139), as demonstrated by stream3. • https://www.exploit-db.com/exploits/21246 •

CVSS: 6.8EPSS: 1%CPEs: 31EXPL: 0

31 Dec 2002 — The screensaver on Windows NT 4.0, 2000, XP, and 2002 does not verify if a domain account has already been locked when a valid password is provided, which makes it easier for users with physical access to conduct brute force password guessing. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/01/msg00278.html •

CVSS: 7.8EPSS: 0%CPEs: 37EXPL: 0

31 Dec 2002 — NT Virtual DOS Machine (NTVDM.EXE) in Windows 2000, NT and XP does not verify user execution permissions for 16-bit executable files, which allows local users to bypass the loader and execute arbitrary programs. NT Virtual DOS Machine (NTVDM.EXE) en Windows 2000, NT y XP no verifica los permisos de ejecución del usuario para archivos ejecutables de 16 bits, lo que permite a los usuarios locales pasar por alto el cargador y ejecutar programas arbitrarios. • http://archives.neohapsis.com/archives/bugtraq/2002-09/0211.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2002 — WebSite Pro 3.1.11.0 on Windows allows remote attackers to read script source code for files with extensions greater than 3 characters via a URL request that uses the equivalent 8.3 file name. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0178.html •

CVSS: 6.1EPSS: 3%CPEs: 3EXPL: 2

31 Dec 2002 — Cross-site scripting (XSS) vulnerability in the default ASP pages on Microsoft Site Server 3.0 on Windows NT 4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) ctr parameter in Default.asp and (2) the query string to formslogin.asp. • https://www.exploit-db.com/exploits/21260 •

CVSS: 10.0EPSS: 7%CPEs: 43EXPL: 0

23 Dec 2002 — Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to execute arbitrary code by including a Java applet that invokes COM (Component Object Model) objects in a web site or an HTML mail. La Máquina Virtual de Microsoft (VM) hasta 5.0.3805 inclusive permite a atacantes remotos ejecutar código arbitrario incluyendo un applet de Java que invoca objetos COM (Component Object Model) en un sitio web o en un correo HTML. • http://www.securityfocus.com/bid/6371 •

CVSS: 9.1EPSS: 4%CPEs: 43EXPL: 0

23 Dec 2002 — The Java Database Connectivity (JDBC) APIs in Microsoft Virtual Machine (VM) 5.0.3805 and earlier allow remote attackers to bypass security checks and access database contents via an untrusted Java applet. Las APIs de conectividad de base de datos Java (JDBC) en Microsoft Virtual Machine (VM) 5.0.3805 y anteriores permiten a los atacantes remotos eludir las comprobaciones de seguridad y acceder al contenido de la base de datos a través de un applet Java no fiable. • http://www.ciac.org/ciac/bulletins/n-026.shtml •

CVSS: 5.0EPSS: 5%CPEs: 43EXPL: 0

23 Dec 2002 — Microsoft Virtual Machine (VM) build 5.0.3805 and earlier allows remote attackers to determine a local user's username via a Java applet that accesses the user.dir system property, aka "User.dir Exposure Vulnerability." Microsoft Virtual Machine (VM) build versión 5.0.3805 y anteriores permite a los atacantes remotos determinar el nombre de usuario de un usuario local a través de un applet de Java que accede a la propiedad del sistema user.dir, también conocida como "User.dir Exposure Vulnerability". • http://www.securityfocus.com/bid/6380 •